Improper access control in Yuzo Related Posts WordPress plugin



Published: 2019-04-12 | Updated: 2019-05-14
Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2019-11869
CWE-ID CWE-284
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software
Subscribe
Related Posts
Web applications / Modules and components for CMS

Vendor Lenin Zapata

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

UPDATED: 14.05.2019
Assigned CVE-ID.

1) Improper access control

EUVDB-ID: #VU18244

Risk: High

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:H/RL:U/RC:C]

CVE-ID: CVE-2019-11869

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to the website.

The vulnerability exists due to improper access restrictions when processing HTTP requests. A remote attacker can pass specially crafted configuration to the affected application and inject arbitrary JavaScript code WordPress configuration.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable application.

Note: the vulnerability is being actively exploited i the wild.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Related Posts: 1.0 - 5.12.94

External links

http://blog.sucuri.net/2019/04/attacks-on-closed-wordpress-plugins.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###