CVE-2020-7047

The WordPress plugin, WP Database Reset through 3.1, contains a flaw that gave any authenticated user, with minimal permissions, the ability (with a simple wp-admin/admin.php?db-reset-tables[]=users request) to escalate their privileges to administrator while dropping all other users from the table.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webfactoryltd:wp_database_reset:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://wordpress.org/plugins/wordpress-database-reset/#developers - Release Notes, Third Party Advisory () https://wordpress.org/plugins/wordpress-database-reset/#developers - Release Notes, Third Party Advisory
References () https://wpvulndb.com/vulnerabilities/10028 - Third Party Advisory () https://wpvulndb.com/vulnerabilities/10028 - Third Party Advisory
References () https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ - Exploit, Patch, Third Party Advisory () https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ - Exploit, Patch, Third Party Advisory

Information

Published : 2020-01-16 21:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-7047

Mitre link : CVE-2020-7047

CVE.ORG link : CVE-2020-7047


JSON object : View

Products Affected

webfactoryltd

  • wp_database_reset
CWE
CWE-269

Improper Privilege Management