Vulnerability Details : CVE-2020-7947
An issue was discovered in the Login by Auth0 plugin before 4.0.0 for WordPress. It has numerous fields that can contain data that is pulled from different sources. One issue with this is that the data isn't sanitized, and no input validation is performed, before the exporting of the user data. This can lead to (at least) CSV injection if a crafted Excel document is uploaded.
Products affected by CVE-2020-7947
- cpe:2.3:a:auth0:login_by_auth0:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7947
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7947
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-7947
-
The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-7947
-
https://github.com/auth0/wp-auth0/security/advisories/GHSA-59vf-cgfw-6h6v
Several vulnerabilities in WordPress Plugin for Auth0 · Advisory · auth0/wp-auth0 · GitHubThird Party Advisory
-
https://wordpress.org/plugins/auth0/#developers
Login by Auth0 – WordPress plugin | WordPress.orgRelease Notes;Third Party Advisory
-
https://auth0.com/docs/cms/wordpress
Login by Auth0 WordPress PluginProduct;Vendor Advisory
-
https://auth0.com/docs/security/bulletins/2020-03-31_wpauth0
Security Update for WordPress Plugin for Auth0Third Party Advisory
Jump to