CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
EPSS
Percentile
97.1%
The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in
WordPress before 4.6 makes a get_plugin_data call before checking the
update_plugins capability, which allows remote authenticated users to
bypass intended read-access restrictions via the plugin parameter to
wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
www.openwall.com/lists/oss-security/2016/08/20/1
core.trac.wordpress.org/changeset/38168
core.trac.wordpress.org/ticket/37490
launchpad.net/bugs/cve/CVE-2016-10148
nvd.nist.gov/vuln/detail/CVE-2016-10148
security-tracker.debian.org/tracker/CVE-2016-10148
sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html
www.cve.org/CVERecord?id=CVE-2016-10148
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
EPSS
Percentile
97.1%