Lucene search

K
cvelistWordfenceCVELIST:CVE-2020-36731
HistoryJun 07, 2023 - 1:51 a.m.

CVE-2020-36731

2023-06-0701:51:54
Wordfence
www.cve.org
wordpress
woocommerce
vulnerable
unauthenticated
arbitrary
plugin settings
cross-site scripting
authorization
sanitization

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

48.8%

The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.

CNA Affected

[
  {
    "vendor": "wpdesk",
    "product": "Flexible Checkout Fields for WooCommerce – WooCommerce Checkout Manager",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThan": "2.3.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

48.8%

Related for CVELIST:CVE-2020-36731