Lucene search

K
cvelistWordfenceCVELIST:CVE-2020-36736
HistoryJul 01, 2023 - 3:30 a.m.

CVE-2020-36736

2023-07-0103:30:11
Wordfence
www.cve.org
3
wordpress
cross-site request forgery
woocommerce

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

4.2

Confidence

High

EPSS

0.002

Percentile

55.6%

The WooCommerce Checkout & Funnel Builder by CartFlows plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.15. This is due to missing or incorrect nonce validation on the export_json, import_json, and status_logs_file functions. This makes it possible for unauthenticated attackers to import/export settings and trigger logs showing via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CNA Affected

[
  {
    "vendor": "cartflowswp",
    "product": "WooCommerce Checkout & Funnel Builder by CartFlows – Create High Converting Stores For WooCommerce",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThan": "1.5.16",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

4.2

Confidence

High

EPSS

0.002

Percentile

55.6%

Related for CVELIST:CVE-2020-36736