- Description
- The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication
- Source
- contact@wpscan.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
- Severity
- HIGH
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ldap_wp_login_\\/_active_directory_integration_project:ldap_wp_login_\\/_active_directory_integration:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "7E73F323-44AB-4390-92EC-FAD5CF782A5C",
"versionEndExcluding": "3.0.2"
}
],
"operator": "OR"
}
]
}
]