First published: Fri Mar 13 2020(Updated: )
The popup-builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sygnoos Popup-builder | <3.64.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Popup-Builder plugin is CVE-2020-10195.
The severity of CVE-2020-10195 is medium with a CVSS score of 6.3.
The Popup-Builder plugin vulnerability allows information disclosure and settings modification through admin-post actions to com/classes/Actions.php.
An authenticated attacker can exploit CVE-2020-10195 by sending a POST request to wp-admin/admin-post.php.
Yes, patches and fixes for CVE-2020-10195 are available. Please refer to the provided references for more information.