The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges.
References
Configurations
History
No history.
Information
Published : 2023-06-07 02:15
Updated : 2023-11-07 03:22
NVD link : CVE-2020-36724
Mitre link : CVE-2020-36724
CVE.ORG link : CVE-2020-36724
JSON object : View
Products Affected
wordable
- wordable
CWE
CWE-306
Missing Authentication for Critical Function