The Site Kit by Google plugin for WordPress is vulnerable to Sensitive Information Disclosure in versions up to, and including, 1.8.0 This is due to the lack of capability checks on the admin_enqueue_scripts action which displays the connection key. This makes it possible for authenticated attackers with any level of access obtaining owner access to a site in the Google Search Console. We recommend upgrading to V1.8.1 or above.
References
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/google-site-kit/site-kit-by-google-171-sensitive-information-disclosure - Third Party Advisory |
14 Jul 2023, 15:00
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/google-site-kit/site-kit-by-google-171-sensitive-information-disclosure - Third Party Advisory | |
CWE | CWE-252 | |
CPE | cpe:2.3:a:google:site_kit:*:*:*:*:*:wordpress:*:* | |
First Time |
Google site Kit
|
07 Jul 2023, 12:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-07 12:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8934
Mitre link : CVE-2020-8934
CVE.ORG link : CVE-2020-8934
JSON object : View
Products Affected
- site_kit
CWE
CWE-252
Unchecked Return Value