Lucene search

K
cvelistWordfenceCVELIST:CVE-2022-0218
HistoryFeb 04, 2022 - 10:29 p.m.

CVE-2022-0218 WP HTML Mail <= 3.0.9 Missing Authorization on REST-API Route

2022-02-0422:29:24
CWE-862
CWE-79
Wordfence
www.cve.org
2
vulnerability
wp html mail
unauthorized access
rest-api
missing capability check
version 3.0.9
wordpress plugin

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

AI Score

8.4

Confidence

High

EPSS

0.032

Percentile

91.4%

The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.

CNA Affected

[
  {
    "product": "WP HTML Mail",
    "vendor": "codemiq",
    "versions": [
      {
        "lessThanOrEqual": "3.0.9",
        "status": "affected",
        "version": "3.0.9",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

AI Score

8.4

Confidence

High

EPSS

0.032

Percentile

91.4%