Vulnerability Details : CVE-2020-36666
Potential exploit
The directory-pro WordPress plugin before 1.9.5, final-user-wp-frontend-user-profiles WordPress plugin before 1.2.2, producer-retailer WordPress plugin through TODO, photographer-directory WordPress plugin before 1.0.9, real-estate-pro WordPress plugin before 1.7.1, institutions-directory WordPress plugin before 1.3.1, lawyer-directory WordPress plugin before 1.2.9, doctor-listing WordPress plugin before 1.3.6, Hotel Listing WordPress plugin before 1.3.7, fitness-trainer WordPress plugin before 1.4.1, wp-membership WordPress plugin before 1.5.7, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.
Products affected by CVE-2020-36666
- cpe:2.3:a:e-plugins:wp_membership:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:fitness_trainer:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:hotel_directory:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:hospital_\&_doctor_directory:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:lawyer_directory:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:institutions_directory:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:real_estate_pro:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:final_user:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:directory_pro:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:photographer-directory:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:e-plugins:producer-retailer:-:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36666
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36666
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-36666
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: contact@wpscan.com (Secondary)
References for CVE-2020-36666
-
https://codecanyon.net/user/e-plugins
e-plugins's profile on CodeCanyonProduct
-
https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96
Just a moment...Exploit;Third Party Advisory
Jump to