Lucene search

K
wpvulndbWpvulndbWPVDB-ID:3F8082A0-B4B2-4068-B529-92662D9BE675
HistoryApr 29, 2024 - 12:00 a.m.

BuddyForms < 2.8.9 - Unauthenticated Arbitrary File Read and Server-Side Request Forgery

2024-04-2900:00:00
wpscan.com
6
wordpress
arbitrary file read
unauthenticated
server-side request forgery
user profiles

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

7.1

Confidence

Low

EPSS

0

Percentile

10.5%

Description The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to Arbitrary File Read and Server-Side Request Forgery in all versions up to, and including, 2.8.8. This makes it possible for unauthenticated attackers to read arbitrary files on the server and make requests to internal services.

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

7.1

Confidence

Low

EPSS

0

Percentile

10.5%

Related for WPVDB-ID:3F8082A0-B4B2-4068-B529-92662D9BE675