First published: Fri Jan 01 2021(Updated: )
An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. Nearly all of the AJAX action endpoints lacked permission checks, allowing these actions to be executed by anyone authenticated on the site. This happened because nonces were used as a means of authorization, but a nonce was present in a publicly viewable page. The greatest impact was the pagelayer_save_content function that allowed pages to be modified and allowed XSS to occur.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pagelayer | <1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the PageLayer plugin issue is CVE-2020-35947.
CVE-2020-35947 has a severity rating of 7.4 (high).
The PageLayer plugin versions up to and excluding 1.1.2 for WordPress are affected by CVE-2020-35947.
The vulnerability in the PageLayer plugin can be exploited by executing unauthorized AJAX actions on the affected site.
Yes, you can find more information about CVE-2020-35947 at the following references: [Wordfence Blog](https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/) and [WPScan](https://wpscan.com/vulnerability/10239).