The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/wordpress-database-reset/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10027 | Third Party Advisory |
https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ | Exploit Patch Third Party Advisory |
https://wordpress.org/plugins/wordpress-database-reset/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10027 | Third Party Advisory |
https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/wordpress-database-reset/#developers - Release Notes, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/10027 - Third Party Advisory | |
References | () https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ - Exploit, Patch, Third Party Advisory |
Information
Published : 2020-01-16 21:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7048
Mitre link : CVE-2020-7048
CVE.ORG link : CVE-2020-7048
JSON object : View
Products Affected
webfactoryltd
- wp_database_reset
CWE
CWE-306
Missing Authentication for Critical Function