Lucene search

K
nvd[email protected]NVD:CVE-2020-36736
HistoryJul 01, 2023 - 4:15 a.m.

CVE-2020-36736

2023-07-0104:15:09
web.nvd.nist.gov
1
woocommerce
cartflows plugin
wordpress
cross-site request forgery
nonce validation
unauthenticated attackers
import/export settings
site administrator

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

4.2

Confidence

High

EPSS

0.002

Percentile

55.6%

The WooCommerce Checkout & Funnel Builder by CartFlows plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.15. This is due to missing or incorrect nonce validation on the export_json, import_json, and status_logs_file functions. This makes it possible for unauthenticated attackers to import/export settings and trigger logs showing via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Affected configurations

Nvd
Node
cartflowscartflowsRange1.5.15wordpress
VendorProductVersionCPE
cartflowscartflows*cpe:2.3:a:cartflows:cartflows:*:*:*:*:*:wordpress:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

4.2

Confidence

High

EPSS

0.002

Percentile

55.6%

Related for NVD:CVE-2020-36736