Vulnerability Details : CVE-2019-20203
Potential exploit
The Authorized Addresses feature in the Postie plugin 1.9.40 for WordPress allows remote attackers to publish posts by spoofing the From information of an email message.
Products affected by CVE-2019-20203
- cpe:2.3:a:postieplugin:postie:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20203
0.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20203
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2019-20203
-
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20203
-
https://postieplugin.com/
Product
-
https://wpvulndb.com/vulnerabilities/10002
Postie <= 1.9.40 - Post Submission Spoofing & Stored XSSThird Party Advisory
-
https://wordpress.org/plugins/postie/#developers
Postie – WordPress plugin | WordPress.orgRelease Notes;Vendor Advisory
-
https://github.com/V1n1v131r4/Exploiting-Postie-WordPress-Plugin-/blob/master/README.md
Exploiting-Postie-WordPress-Plugin-/README.md at master · V1n1v131r4/Exploiting-Postie-WordPress-Plugin- · GitHubExploit;Third Party Advisory
Jump to