The Adning Advertising plugin for WordPress is vulnerable to file deletion via path traversal in versions up to, and including, 1.5.5. This allows unauthenticated attackers to delete arbitrary files which can be used to reset and gain full control of a site.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/ - Third Party Advisory | |
References | () https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693 - Product | |
References | () https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/ - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/e7506429-7f8a-45b5-b1b0-6fdb39599ee5?source=cve - Third Party Advisory |
14 Jun 2023, 19:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tunasite:adning_advertising:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693 - Product | |
References | (MISC) https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/ - Third Party Advisory | |
References | (MISC) https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/ - Exploit, Third Party Advisory | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/e7506429-7f8a-45b5-b1b0-6fdb39599ee5?source=cve - Third Party Advisory |
07 Jun 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-07 13:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36728
Mitre link : CVE-2020-36728
CVE.ORG link : CVE-2020-36728
JSON object : View
Products Affected
tunasite
- adning_advertising
CWE
No CWE.