The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 9.3.3 does not properly block access to the REST API users endpoint when the blog is in a subdirectory, which could allow attackers to bypass the restriction in place and list users
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5 | Exploit Vendor Advisory |
https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5 - Exploit, Vendor Advisory | |
Summary |
|
07 Nov 2023, 03:57
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-01-02 22:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4417
Mitre link : CVE-2022-4417
CVE.ORG link : CVE-2022-4417
JSON object : View
Products Affected
cerber
- wp_cerber_security\,_anti-spam_\&_malware_scan
CWE
No CWE.