CVE-2020-7048

The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webfactoryltd:wp_database_reset:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://wordpress.org/plugins/wordpress-database-reset/#developers - Release Notes, Third Party Advisory () https://wordpress.org/plugins/wordpress-database-reset/#developers - Release Notes, Third Party Advisory
References () https://wpvulndb.com/vulnerabilities/10027 - Third Party Advisory () https://wpvulndb.com/vulnerabilities/10027 - Third Party Advisory
References () https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ - Exploit, Patch, Third Party Advisory () https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ - Exploit, Patch, Third Party Advisory

Information

Published : 2020-01-16 21:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-7048

Mitre link : CVE-2020-7048

CVE.ORG link : CVE-2020-7048


JSON object : View

Products Affected

webfactoryltd

  • wp_database_reset
CWE
CWE-306

Missing Authentication for Critical Function