First published: Wed Jan 08 2020(Updated: )
A flaw in Give before 2.5.5, a WordPress plugin, allowed unauthenticated users to bypass API authentication methods and access personally identifiable user information (PII) including names, addresses, IP addresses, and email addresses. Once an API key has been set to any meta key value from the wp_usermeta table, and the token is set to the corresponding MD5 hash of the meta key selected, one can make a request to the restricted endpoints, and thus access sensitive donor data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Givenu Givenu Give | <2.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20360 is a vulnerability in the Give before 2.5.5 WordPress plugin that allows unauthenticated users to bypass API authentication and access personally identifiable user information.
CVE-2019-20360 has a severity score of 7.5 out of 10, making it a high severity vulnerability.
CVE-2019-20360 affects versions of the Give plugin before version 2.5.5.
To fix CVE-2019-20360, you should update the Give plugin to version 2.5.5 or newer.
More information about CVE-2019-20360 can be found at the following references: [link](https://wpvulndb.com/vulnerabilities/9889) and [link](https://www.wordfence.com/blog/2019/09/authentication-bypass-vulnerability-in-givewp-plugin/).