Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/auth0/wp-auth0/security/advisories/GHSA-59vf-cgfw-6h6v", "name": "https://github.com/auth0/wp-auth0/security/advisories/GHSA-59vf-cgfw-6h6v", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://auth0.com/docs/security/bulletins/2020-03-31_wpauth0", "name": "https://auth0.com/docs/security/bulletins/2020-03-31_wpauth0", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://wordpress.org/plugins/auth0/#developers", "name": "https://wordpress.org/plugins/auth0/#developers", "tags": ["Release Notes", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://auth0.com/docs/cms/wordpress", "name": "https://auth0.com/docs/cms/wordpress", "tags": ["Product", "Vendor Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "An issue was discovered in the Login by Auth0 plugin before 4.0.0 for WordPress. It has numerous fields that can contain data that is pulled from different sources. One issue with this is that the data isn't sanitized, and no input validation is performed, before the exporting of the user data. This can lead to (at least) CSV injection if a crafted Excel document is uploaded."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-1236"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2020-7947", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "acInsufInfo": false, "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}}, "publishedDate": "2020-04-01T13:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:auth0:login_by_auth0:*:*:*:*:*:wordpress:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.0.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-07-21T11:39Z"}