The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-03-28 11:15
Updated : 2022-04-04 11:08
NVD link : CVE-2022-0833
Mitre link : CVE-2022-0833
JSON object : View
CWE
CWE-862
Missing Authorization
Products Affected
church_admin_project
- church_admin