First published: Mon Mar 23 2020(Updated: )
CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page. NOTE: A contributor to the CodeIgniter framework argues that the issue should not be attributed to CodeIgniter. Furthermore, the blog post reference shows an unknown website built with the CodeIgniter framework but that CodeIgniter is not responsible for introducing this issue because the framework has never provided a login screen, nor any kind of login or user management facilities beyond a Session library. Also, another reporter indicates the issue is with a custom module/plugin to CodeIgniter, not CodeIgniter itself.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Codeigniter Codeigniter | <=4.0.0 | |
composer/codeigniter4/framework | <=4.0.0 | |
<=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10793 is a vulnerability in the CodeIgniter framework through version 4.0.0 that allows remote attackers to gain privileges by modifying the Email ID on the "Select Role of the User" page.
CVE-2020-10793 has a severity score of 8.8, which is considered high.
CVE-2020-10793 affects CodeIgniter through version 4.0.0 and allows remote attackers to gain privileges by modifying the Email ID on the "Select Role of the User" page.
To fix CVE-2020-10793, it is recommended to update CodeIgniter to a version higher than 4.0.0.
You can find more information about CVE-2020-10793 on the CodeIgniter user guide and a Medium blog post. Please refer to the provided references for the links.