In the AccessAlly WordPress plugin before 3.5.7, the file "resource/frontend/product/product-shortcode.php" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 - Exploit, Third Party Advisory |
Information
Published : 2021-04-12 14:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24226
Mitre link : CVE-2021-24226
CVE.ORG link : CVE-2021-24226
JSON object : View
Products Affected
accessally
- accessally
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor