The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d - Exploit, Third Party Advisory |
07 Nov 2023, 03:41
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-352 |
27 Jun 2023, 16:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-352 |
Information
Published : 2022-03-28 18:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0833
Mitre link : CVE-2022-0833
CVE.ORG link : CVE-2022-0833
JSON object : View
Products Affected
church_admin_project
- church_admin