First published: Wed Jun 07 2023(Updated: )
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup wizard (if it has not been run previously) and access plugin configuration options.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Melapress WP Activity Log | <=4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-36716.
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1.
Yes, this vulnerability has a severity keyword of high with a severity value of 7.3.
An unauthenticated attacker can exploit this vulnerability by running the setup wizard if it has not been run previously and gain unauthorized access.
Yes, fixes for this vulnerability are available in versions after 4.0.1 of the WP Activity Log plugin for WordPress.