The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d | Exploit Third Party Advisory |
Configurations
History
27 Jun 2023, 16:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-352 |
04 Apr 2022, 18:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.3 |
CPE | cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d - Exploit, Third Party Advisory |
28 Mar 2022, 18:45
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-28 18:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-0833
Mitre link : CVE-2022-0833
CVE.ORG link : CVE-2022-0833
JSON object : View
Products Affected
church_admin_project
- church_admin