Lucene search

K
nvd[email protected]NVD:CVE-2021-24881
HistoryJan 23, 2023 - 3:15 p.m.

CVE-2021-24881

2023-01-2315:15:13
web.nvd.nist.gov
passster
wordpress
plugin
bypass
vulnerability
unauthenticated users
crafted request

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

62.4%

The Passster WordPress plugin before 3.5.5.9 does not properly check for password, as well as that the post to be viewed is public, allowing unauthenticated users to bypass the protection offered by the plugin, and access arbitrary posts (such as private) content, by sending a specifically crafted request.

Affected configurations

Nvd
Node
passster_projectpassterRange<3.5.5.9wordpress
VendorProductVersionCPE
passster_projectpasster*cpe:2.3:a:passster_project:passter:*:*:*:*:*:wordpress:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

62.4%

Related for NVD:CVE-2021-24881