The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/wordpress-database-reset/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10027 | Third Party Advisory |
https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ | Exploit Patch Third Party Advisory |
https://wordpress.org/plugins/wordpress-database-reset/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10027 | Third Party Advisory |
https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/ | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-01-16 21:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7048
Mitre link : CVE-2020-7048
CVE.ORG link : CVE-2020-7048
JSON object : View
Products Affected
webfactoryltd
- wp_database_reset
CWE
CWE-306
Missing Authentication for Critical Function