First published: Thu Jan 16 2020(Updated: )
The WordPress plugin, WP Database Reset through 3.1, contains a flaw that gave any authenticated user, with minimal permissions, the ability (with a simple wp-admin/admin.php?db-reset-tables[]=users request) to escalate their privileges to administrator while dropping all other users from the table.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WP Database Reset | <=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7047 has been classified with a high severity level due to its ability to allow privilege escalation.
To fix CVE-2020-7047, update the WP Database Reset plugin to version 3.1 or later.
Any authenticated user with minimal permissions on WordPress sites using the vulnerable WP Database Reset plugin is affected by CVE-2020-7047.
An attacker can escalate their privileges to administrator and drop all other users from the database.
While there have been reports of exploitation, it is crucial to apply the necessary updates to mitigate risks associated with CVE-2020-7047.