Search criteria
9 vulnerabilities found for access_demo_importer by accesspressthemes
FKIE_CVE-2022-23975
Vulnerability from fkie_nvd - Published: 2022-04-18 17:15 - Updated: 2024-11-21 06:49
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Summary
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to activate any installed plugin.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| accesspressthemes | access_demo_importer | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:accesspressthemes:access_demo_importer:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F78C9CD0-5590-4410-915C-138F912BE019",
"versionEndIncluding": "1.0.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to activate any installed plugin."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en Access Demo Importer versiones anteriores a 1.0.7 incluy\u00e9ndola en WordPress, permite a un atacante activar cualquier plugin instalado"
}
],
"id": "CVE-2022-23975",
"lastModified": "2024-11-21T06:49:35.027",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "audit@patchstack.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-18T17:15:16.497",
"references": [
{
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
},
{
"source": "audit@patchstack.com",
"tags": [
"Vendor Advisory"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
}
],
"sourceIdentifier": "audit@patchstack.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "audit@patchstack.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-23976
Vulnerability from fkie_nvd - Published: 2022-04-18 17:15 - Updated: 2024-11-21 06:49
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Summary
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media).
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| accesspressthemes | access_demo_importer | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:accesspressthemes:access_demo_importer:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F78C9CD0-5590-4410-915C-138F912BE019",
"versionEndIncluding": "1.0.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media)."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en Access Demo Importer versiones anteriores a 1.0.7 incluy\u00e9ndola en WordPress, permite a un atacante restablecer todos los datos (posts / p\u00e1ginas / medios)"
}
],
"id": "CVE-2022-23976",
"lastModified": "2024-11-21T06:49:35.160",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "audit@patchstack.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-18T17:15:16.560",
"references": [
{
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
},
{
"source": "audit@patchstack.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
}
],
"sourceIdentifier": "audit@patchstack.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "audit@patchstack.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-39317
Vulnerability from fkie_nvd - Published: 2021-10-11 16:15 - Updated: 2024-11-21 06:19
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:accesspressthemes:access_demo_importer:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7B882164-9542-4BE8-AACD-EC3414B031A2",
"versionEndExcluding": "1.0.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:accesspress-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C4B86A44-3C95-4381-8C50-31EFD2D0D8D3",
"versionEndIncluding": "2.92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:accesspress-mag:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E74E3E83-3D4E-41F9-8929-4ABF3D96579A",
"versionEndIncluding": "2.6.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:accesspress-parallax:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "369B898F-09E6-4364-93A3-846F13B02BDB",
"versionEndIncluding": "4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:accesspress-root:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "244AB2A5-42DF-4A21-AE13-9069A27BE40C",
"versionEndIncluding": "2.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:accesspress-store:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C12EA17B-88A1-40DA-9EB2-F3D2D398932E",
"versionEndIncluding": "2.4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:accesspress_basic:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "9B38C352-E601-47DD-8DFA-E7F572BDA756",
"versionEndIncluding": "3.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:agency-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BC3DBCDD-7C01-4F4A-BC3E-CE22F2E3E63C",
"versionEndIncluding": "1.1.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:arrival:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A426CC81-EB8E-4F47-8026-E62267D71C78",
"versionEndIncluding": "1.4.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:bingle:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D8458BA0-C5A1-41DC-A9E9-0253A3DEAA26",
"versionEndIncluding": "1.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:bloger:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "1E05D621-06A9-4F29-8824-7AD659C4E7C9",
"versionEndIncluding": "1.2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:brovy:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "42FA68E8-ECF3-42F2-95D0-46DEEF01B889",
"versionEndIncluding": "1.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:construction-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "303CB290-B4BE-4CC9-9827-B21839EC476A",
"versionEndIncluding": "1.2.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:doko:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "88B47417-52FE-4EAB-8F57-474472C5741F",
"versionEndIncluding": "1.0.27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:edict-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A62478E1-5002-443D-A2F7-7F5C1356BBC0",
"versionEndIncluding": "1.1.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:eight-sec:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6EDDAB34-CEFA-49AF-9CF9-8FCBE7798D35",
"versionEndIncluding": "1.1.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:eightlaw-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F47266D4-13D4-43C8-AC26-2A6103816C75",
"versionEndIncluding": "2.1.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:eightmedi-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "42545424-0765-42BB-B258-4A3A4D20EB20",
"versionEndIncluding": "2.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:eightstore-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C0173905-2C2C-4363-BA32-1908B5438595",
"versionEndIncluding": "1.2.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:enlighten:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D66A0563-AE3F-42BC-A925-BBE4352D9C49",
"versionEndIncluding": "1.3.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:fotography:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "77DC9651-F34B-4483-99B6-B81CFDEF2BCE",
"versionEndIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:opstore:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6DEDF0A3-7E54-4941-B055-27A3B90737AA",
"versionEndIncluding": "1.4.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:parallaxsome:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A2D8588C-5274-4CF8-9114-40449B4D6C56",
"versionEndIncluding": "1.3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:punte:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "13973A00-8DB0-4D47-BD53-B820BD483E52",
"versionEndIncluding": "1.1.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:revolve:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5BB3C9DF-B6E2-4E95-8F79-13E8BAFFB4C3",
"versionEndIncluding": "1.3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:ripple:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C1ACA939-215C-468E-BA06-4644D6825FA9",
"versionEndIncluding": "1.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:sakala:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "92D29815-F86C-4B63-8FC4-00505BA1C770",
"versionEndIncluding": "1.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:scrollme:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "CB501D18-959B-4C9E-B3A4-8F5CC172FA02",
"versionEndIncluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:storevilla:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "0FED4DDA-3EAB-4DFB-A4DA-FB38D6F6F803",
"versionEndIncluding": "1.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:swing-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "75517173-BE41-4AB7-AC2C-52A15F3FAE31",
"versionEndIncluding": "1.1.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:the-launcher:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "4CAD6647-B863-4BC8-BC21-8B503DC860BC",
"versionEndIncluding": "1.3.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:the-monday:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "39D0EC31-69BB-47D8-B184-10D60A221D75",
"versionEndIncluding": "1.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:the100:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "96732393-CBBF-47C1-BF33-51E4564009D2",
"versionEndIncluding": "1.1.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:ultra-seven:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C3800F6C-AA24-4B4B-BBC4-30DB2FF36C01",
"versionEndIncluding": "1.2.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:uncode-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F1718D1E-73D7-46DD-A417-6B90834C5BA7",
"versionEndIncluding": "1.3.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:vmag:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "CD582D2D-C49F-4AA3-8FC3-01034DB7B203",
"versionEndIncluding": "1.2.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:vmagazine-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "767336BB-D32E-4B44-BFE2-FE5202951ACD",
"versionEndIncluding": "1.3.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:vmagazine-news:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B7C79A35-BF0A-4260-B33B-A06DC30DB26B",
"versionEndIncluding": "1.0.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:wp-store:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "DD5148C0-ADD6-43E9-BB7F-DE1E5441009A",
"versionEndIncluding": "1.1.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:wpparallax:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "53EF8744-2D06-45C1-82C8-E4612A4F9C93",
"versionEndIncluding": "2.0.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:zigcy-baby:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F49E0595-3BB8-4B42-BB0D-DE77F1A0B897",
"versionEndIncluding": "1.0.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:zigcy-cosmetics:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7137F261-2B90-4D4F-8FB0-12B755E288B1",
"versionEndIncluding": "1.0.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:accesspressthemes:zigcy-lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "60EDEDD9-A932-48B8-9E2A-6B548F2E29DE",
"versionEndIncluding": "2.0.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer \u003c=1.0.6 WordPress Themes: accesspress-basic \u003c= 3.2.1 accesspress-lite \u003c= 2.92 accesspress-mag \u003c= 2.6.5 accesspress-parallax \u003c= 4.5 accesspress-root \u003c= 2.5 accesspress-store \u003c= 2.4.9 agency-lite \u003c= 1.1.6 arrival \u003c= 1.4.2 bingle \u003c= 1.0.4 bloger \u003c= 1.2.6 brovy \u003c= 1.3 construction-lite \u003c= 1.2.5 doko \u003c= 1.0.27 edict-lite \u003c= 1.1.4 eightlaw-lite \u003c= 2.1.5 eightmedi-lite \u003c= 2.1.8 eight-sec \u003c= 1.1.4 eightstore-lite \u003c= 1.2.5 enlighten \u003c= 1.3.5 fotography \u003c= 2.4.0 opstore \u003c= 1.4.3 parallaxsome \u003c= 1.3.6 punte \u003c= 1.1.2 revolve \u003c= 1.3.1 ripple \u003c= 1.2.0 sakala \u003c= 1.0.4 scrollme \u003c= 2.1.0 storevilla \u003c= 1.4.1 swing-lite \u003c= 1.1.9 the100 \u003c= 1.1.2 the-launcher \u003c= 1.3.2 the-monday \u003c= 1.4.1 ultra-seven \u003c= 1.2.8 uncode-lite \u003c= 1.3.3 vmag \u003c= 1.2.7 vmagazine-lite \u003c= 1.3.5 vmagazine-news \u003c= 1.0.5 wpparallax \u003c= 2.0.6 wp-store \u003c= 1.1.9 zigcy-baby \u003c= 1.0.6 zigcy-cosmetics \u003c= 1.0.5 zigcy-lite \u003c= 2.0.9"
},
{
"lang": "es",
"value": "Un plugin de WordPress y varios temas de WordPress desarrollados por AccessPress Themes son vulnerables a la carga de archivos maliciosos a trav\u00e9s de la acci\u00f3n plugin_offline_installer AJAX debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n plugin_offline_installer_callback que se encuentra en el archivo /demo-functions.php o /welcome.php de los productos afectados. La lista completa de los productos afectados y sus versiones se encuentra a continuaci\u00f3n: Plugin de WordPress: AccessPress Demo Importer versiones anteriores o iguales a 1.0.6 WordPress Themes: accesspress-basic versiones anteriores o iguales a 3.2.1 accesspress-lite versiones anteriores o iguales a 2.92 accesspress-mag versiones anteriores o iguales a 2.6.5 accesspress-parallax versiones anteriores o iguales a 4.5 accesspress-root versiones anteriores o iguales a 2.5 accesspress-store versiones anteriores o iguales a 2.4.9 agency-lite versiones anteriores o iguales a 1.1. 6 arrival versiones anteriores o iguales a 1.4.2 bingle versiones anteriores o iguales a 1.0.4 bloger versiones anteriores o iguales a 1.2.6 brovy versiones anteriores o iguales a 1.3 construction-lite versiones anteriores o iguales a 1.2.5 doko versiones anteriores o iguales a 1.0.27 edict-lite versiones anteriores o iguales a 1.1.4 eightlaw-lite versiones anteriores o iguales a 2.1.5 eightmedi-lite versiones anteriores o iguales a 2.1.8 eight-sec versiones anteriores o iguales a 1.1.4 eightstore-lite versiones anteriores o iguales a 1.2.5 enlighten versiones anteriores o iguales a 1. 3.5 fotography versiones anteriores o iguales a 2.4.0 opstore versiones anteriores o iguales a 1.4.3 parallaxsome versiones anteriores o iguales a 1.3.6 punte versiones anteriores o iguales a 1.1.2 revolve versiones anteriores o iguales a 1.3.1 ripple versiones anteriores o iguales a 1.2.0 sakala versiones anteriores o iguales a 1.0.4 scrollme versiones anteriores o iguales a 2.1.0 storevilla versiones anteriores o iguales a 1.4.1 swing-lite versiones anteriores o iguales a 1.1.9 the100 versiones anteriores o iguales a 1.1.2 the-launcher versiones anteriores o iguales a 1.3. 2 the-monday versiones anteriores o iguales a 1.4.1 ultra-seven versiones anteriores o iguales a 1.2.8 uncode-lite versiones anteriores o iguales a 1.3.3 vmag versiones anteriores o iguales a 1.2.7 vmagazine-lite versiones anteriores o iguales a 1.3.5 vmagazine-news versiones anteriores o iguales a 1.0.5 wpparallax versiones anteriores o iguales a 2.0.6 wp-store versiones anteriores o iguales a 1.1.9 zigcy-baby versiones anteriores o iguales a 1.0.6 zigcy-cosmetics versiones anteriores o iguales a 1.0.5 zigcy-lite versiones anteriores o iguales a 2.0.9"
}
],
"id": "CVE-2021-39317",
"lastModified": "2024-11-21T06:19:13.500",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "security@wordfence.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-11T16:15:07.650",
"references": [
{
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
],
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
},
{
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
}
],
"sourceIdentifier": "security@wordfence.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "security@wordfence.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-23976 (GCVE-0-2022-23976)
Vulnerability from cvelistv5 – Published: 2022-04-18 16:20 – Updated: 2025-02-20 20:26
VLAI?
Title
WordPress Access Demo Importer plugin <= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Data Reset (Posts / Pages / Media)
Summary
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media).
Severity ?
8.1 (High)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AccessPress Themes | Access Demo Importer (WordPress plugin) |
Affected:
<= 1.0.7 , ≤ 1.0.7
(custom)
|
Credits
Vulnerability discovered by Ex.Mi (Patchstack)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:59:23.287Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-23976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-20T19:31:28.378289Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-20T20:26:33.800Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Access Demo Importer (WordPress plugin)",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.7",
"status": "affected",
"version": "\u003c= 1.0.7",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"datePublic": "2022-01-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-18T16:20:30.000Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Data Reset (Posts / Pages / Media)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "audit@patchstack.com",
"DATE_PUBLIC": "2022-01-24T12:01:00.000Z",
"ID": "CVE-2022-23976",
"STATE": "PUBLIC",
"TITLE": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Data Reset (Posts / Pages / Media)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Access Demo Importer (WordPress plugin)",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "\u003c= 1.0.7",
"version_value": "1.0.7"
}
]
}
}
]
},
"vendor_name": "AccessPress Themes"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media)."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/access-demo-importer/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"name": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media",
"refsource": "CONFIRM",
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2022-23976",
"datePublished": "2022-04-18T16:20:30.233Z",
"dateReserved": "2022-01-26T00:00:00.000Z",
"dateUpdated": "2025-02-20T20:26:33.800Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23975 (GCVE-0-2022-23975)
Vulnerability from cvelistv5 – Published: 2022-04-18 16:20 – Updated: 2025-02-20 20:26
VLAI?
Title
WordPress Access Demo Importer plugin <= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary Plugin Activation
Summary
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to activate any installed plugin.
Severity ?
6.5 (Medium)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AccessPress Themes | Access Demo Importer (WordPress plugin) |
Affected:
<= 1.0.7 , ≤ 1.0.7
(custom)
|
Credits
Vulnerability discovered by Ex.Mi (Patchstack)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:59:23.306Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-23975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-20T19:31:23.751074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-20T20:26:24.958Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Access Demo Importer (WordPress plugin)",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.7",
"status": "affected",
"version": "\u003c= 1.0.7",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"datePublic": "2022-01-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to activate any installed plugin."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-18T16:20:30.000Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary Plugin Activation",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "audit@patchstack.com",
"DATE_PUBLIC": "2022-01-24T12:01:00.000Z",
"ID": "CVE-2022-23975",
"STATE": "PUBLIC",
"TITLE": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary Plugin Activation"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Access Demo Importer (WordPress plugin)",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "\u003c= 1.0.7",
"version_value": "1.0.7"
}
]
}
}
]
},
"vendor_name": "AccessPress Themes"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to activate any installed plugin."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/access-demo-importer/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"name": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation",
"refsource": "CONFIRM",
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2022-23975",
"datePublished": "2022-04-18T16:20:30.943Z",
"dateReserved": "2022-01-26T00:00:00.000Z",
"dateUpdated": "2025-02-20T20:26:24.958Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39317 (GCVE-0-2021-39317)
Vulnerability from cvelistv5 – Published: 2021-10-11 15:48 – Updated: 2025-02-14 18:23
VLAI?
Title
AccessPress Themes - Authenticated Malicious File Upload
Summary
A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9
Severity ?
8.8 (High)
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| AccessPress Themes | Access Demo Importer |
Affected:
1.0.6 , ≤ 1.0.6
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Chloe Chamberland, Wordfence
Lenon Leite
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.686Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-39317",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-14T18:23:19.419703Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-14T18:23:25.466Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Access Demo Importer",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.6",
"status": "affected",
"version": "1.0.6",
"versionType": "custom"
}
]
},
{
"product": "accesspress-basic",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "3.2.1",
"status": "affected",
"version": "3.2.1",
"versionType": "custom"
}
]
},
{
"product": "accesspress-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.9.2",
"status": "affected",
"version": "2.9.2",
"versionType": "custom"
}
]
},
{
"product": "accesspress-mag",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.6.5",
"status": "affected",
"version": "2.6.5",
"versionType": "custom"
}
]
},
{
"product": "accesspress-parallax",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "4.5",
"status": "affected",
"version": "4.5",
"versionType": "custom"
}
]
},
{
"product": "accesspress-root",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.5",
"status": "affected",
"version": "2.5",
"versionType": "custom"
}
]
},
{
"product": "accesspress-store",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.4.9",
"status": "affected",
"version": "2.4.9",
"versionType": "custom"
}
]
},
{
"product": "agency-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.6",
"status": "affected",
"version": "1.1.6",
"versionType": "custom"
}
]
},
{
"product": "arrival",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.2",
"status": "affected",
"version": "1.4.2",
"versionType": "custom"
}
]
},
{
"product": "bingle",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.4",
"status": "affected",
"version": "1.0.4",
"versionType": "custom"
}
]
},
{
"product": "bloger",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.6",
"status": "affected",
"version": "1.2.6",
"versionType": "custom"
}
]
},
{
"product": "brovy",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3",
"status": "affected",
"version": "1.3",
"versionType": "custom"
}
]
},
{
"product": "construction-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.5",
"status": "affected",
"version": "1.2.5",
"versionType": "custom"
}
]
},
{
"product": "doko",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.27",
"status": "affected",
"version": "1.0.27",
"versionType": "custom"
}
]
},
{
"product": "edict-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.4",
"status": "affected",
"version": "1.1.4",
"versionType": "custom"
}
]
},
{
"product": "enlighten",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.5",
"status": "affected",
"version": "1.3.5",
"versionType": "custom"
}
]
},
{
"product": "fotography",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.4.0",
"status": "affected",
"version": "2.4.0",
"versionType": "custom"
}
]
},
{
"product": "opstore",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.3",
"status": "affected",
"version": "1.4.3",
"versionType": "custom"
}
]
},
{
"product": "parallaxsome",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.6",
"status": "affected",
"version": "1.3.6",
"versionType": "custom"
}
]
},
{
"product": "punte",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.2",
"status": "affected",
"version": "1.1.2",
"versionType": "custom"
}
]
},
{
"product": "revolve",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.1",
"status": "affected",
"version": "1.3.1",
"versionType": "custom"
}
]
},
{
"product": "ripple",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.0",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
}
]
},
{
"product": "sakala",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.4",
"status": "affected",
"version": "1.0.4",
"versionType": "custom"
}
]
},
{
"product": "scrollme",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.1.0",
"status": "affected",
"version": "2.1.0",
"versionType": "custom"
}
]
},
{
"product": "storevilla",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.1",
"status": "affected",
"version": "1.4.1",
"versionType": "custom"
}
]
},
{
"product": "swing-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.9",
"status": "affected",
"version": "1.1.9",
"versionType": "custom"
}
]
},
{
"product": "swing-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.9",
"status": "affected",
"version": "1.1.9",
"versionType": "custom"
}
]
},
{
"product": "the100",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.2",
"status": "affected",
"version": "1.1.2",
"versionType": "custom"
}
]
},
{
"product": "the-launcher",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.2",
"status": "affected",
"version": "1.3.2",
"versionType": "custom"
}
]
},
{
"product": "the-monday",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.1",
"status": "affected",
"version": "1.4.1",
"versionType": "custom"
}
]
},
{
"product": "ultra-seven",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.8",
"status": "affected",
"version": "1.2.8",
"versionType": "custom"
}
]
},
{
"product": "uncode-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.3",
"status": "affected",
"version": "1.3.3",
"versionType": "custom"
}
]
},
{
"product": "vmag",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.7",
"status": "affected",
"version": "1.2.7",
"versionType": "custom"
}
]
},
{
"product": "vmagazine-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.5",
"status": "affected",
"version": "1.3.5",
"versionType": "custom"
}
]
},
{
"product": "vmagazine-news",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.5",
"status": "affected",
"version": "1.0.5",
"versionType": "custom"
}
]
},
{
"product": "wpparallax",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.0.6",
"status": "affected",
"version": "2.0.6",
"versionType": "custom"
}
]
},
{
"product": "wp-store",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.9",
"status": "affected",
"version": "1.1.9",
"versionType": "custom"
}
]
},
{
"product": "zigcy-baby",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.6",
"status": "affected",
"version": "1.0.6",
"versionType": "custom"
}
]
},
{
"product": "zigcy-cosmetics",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.5",
"status": "affected",
"version": "1.0.5",
"versionType": "custom"
}
]
},
{
"product": "zigcy-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.9",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Chloe Chamberland, Wordfence"
},
{
"lang": "en",
"value": "Lenon Leite"
}
],
"datePublic": "2021-10-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer \u003c=1.0.6 WordPress Themes: accesspress-basic \u003c= 3.2.1 accesspress-lite \u003c= 2.92 accesspress-mag \u003c= 2.6.5 accesspress-parallax \u003c= 4.5 accesspress-root \u003c= 2.5 accesspress-store \u003c= 2.4.9 agency-lite \u003c= 1.1.6 arrival \u003c= 1.4.2 bingle \u003c= 1.0.4 bloger \u003c= 1.2.6 brovy \u003c= 1.3 construction-lite \u003c= 1.2.5 doko \u003c= 1.0.27 edict-lite \u003c= 1.1.4 eightlaw-lite \u003c= 2.1.5 eightmedi-lite \u003c= 2.1.8 eight-sec \u003c= 1.1.4 eightstore-lite \u003c= 1.2.5 enlighten \u003c= 1.3.5 fotography \u003c= 2.4.0 opstore \u003c= 1.4.3 parallaxsome \u003c= 1.3.6 punte \u003c= 1.1.2 revolve \u003c= 1.3.1 ripple \u003c= 1.2.0 sakala \u003c= 1.0.4 scrollme \u003c= 2.1.0 storevilla \u003c= 1.4.1 swing-lite \u003c= 1.1.9 the100 \u003c= 1.1.2 the-launcher \u003c= 1.3.2 the-monday \u003c= 1.4.1 ultra-seven \u003c= 1.2.8 uncode-lite \u003c= 1.3.3 vmag \u003c= 1.2.7 vmagazine-lite \u003c= 1.3.5 vmagazine-news \u003c= 1.0.5 wpparallax \u003c= 2.0.6 wp-store \u003c= 1.1.9 zigcy-baby \u003c= 1.0.6 zigcy-cosmetics \u003c= 1.0.5 zigcy-lite \u003c= 2.0.9"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285 Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-13T20:27:30.000Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to the latest available version of software for each, or uninstall from WordPress site if no updated software available."
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "AccessPress Themes - Authenticated Malicious File Upload",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"AKA": "Wordfence",
"ASSIGNER": "security@wordfence.com",
"DATE_PUBLIC": "2021-10-06T19:17:00.000Z",
"ID": "CVE-2021-39317",
"STATE": "PUBLIC",
"TITLE": "AccessPress Themes - Authenticated Malicious File Upload"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Access Demo Importer",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.6",
"version_value": "1.0.6"
}
]
}
},
{
"product_name": "accesspress-basic",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.2.1",
"version_value": "3.2.1"
}
]
}
},
{
"product_name": "accesspress-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.9.2",
"version_value": "2.9.2"
}
]
}
},
{
"product_name": "accesspress-mag",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.6.5",
"version_value": "2.6.5"
}
]
}
},
{
"product_name": "accesspress-parallax",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "4.5",
"version_value": "4.5"
}
]
}
},
{
"product_name": "accesspress-root",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.5",
"version_value": "2.5"
}
]
}
},
{
"product_name": "accesspress-store",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.4.9",
"version_value": "2.4.9"
}
]
}
},
{
"product_name": "agency-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.6",
"version_value": "1.1.6"
}
]
}
},
{
"product_name": "arrival",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.2",
"version_value": "1.4.2"
}
]
}
},
{
"product_name": "bingle",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.4",
"version_value": "1.0.4"
}
]
}
},
{
"product_name": "bloger",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.6",
"version_value": "1.2.6"
}
]
}
},
{
"product_name": "brovy",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3",
"version_value": "1.3"
}
]
}
},
{
"product_name": "construction-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.5",
"version_value": "1.2.5"
}
]
}
},
{
"product_name": "doko",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.27",
"version_value": "1.0.27"
}
]
}
},
{
"product_name": "edict-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.4",
"version_value": "1.1.4"
}
]
}
},
{
"product_name": "enlighten",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.5",
"version_value": "1.3.5"
}
]
}
},
{
"product_name": "fotography",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.4.0",
"version_value": "2.4.0"
}
]
}
},
{
"product_name": "opstore",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.3",
"version_value": "1.4.3"
}
]
}
},
{
"product_name": "parallaxsome",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.6",
"version_value": "1.3.6"
}
]
}
},
{
"product_name": "punte",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.2",
"version_value": "1.1.2"
}
]
}
},
{
"product_name": "revolve",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.1",
"version_value": "1.3.1"
}
]
}
},
{
"product_name": "ripple",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.0",
"version_value": "1.2.0"
}
]
}
},
{
"product_name": "sakala",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.4",
"version_value": "1.0.4"
}
]
}
},
{
"product_name": "scrollme",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.1.0",
"version_value": "2.1.0"
}
]
}
},
{
"product_name": "storevilla",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.1",
"version_value": "1.4.1"
}
]
}
},
{
"product_name": "swing-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.9",
"version_value": "1.1.9"
}
]
}
},
{
"product_name": "swing-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.9",
"version_value": "1.1.9"
}
]
}
},
{
"product_name": "the100",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.2",
"version_value": "1.1.2"
}
]
}
},
{
"product_name": "the-launcher",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.2",
"version_value": "1.3.2"
}
]
}
},
{
"product_name": "the-monday",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.1",
"version_value": "1.4.1"
}
]
}
},
{
"product_name": "ultra-seven",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.8",
"version_value": "1.2.8"
}
]
}
},
{
"product_name": "uncode-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.3",
"version_value": "1.3.3"
}
]
}
},
{
"product_name": "vmag",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.7",
"version_value": "1.2.7"
}
]
}
},
{
"product_name": "vmagazine-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.5",
"version_value": "1.3.5"
}
]
}
},
{
"product_name": "vmagazine-news",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.5",
"version_value": "1.0.5"
}
]
}
},
{
"product_name": "wpparallax",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.0.6",
"version_value": "2.0.6"
}
]
}
},
{
"product_name": "wp-store",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.9",
"version_value": "1.1.9"
}
]
}
},
{
"product_name": "zigcy-baby",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.6",
"version_value": "1.0.6"
}
]
}
},
{
"product_name": "zigcy-cosmetics",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.5",
"version_value": "1.0.5"
}
]
}
},
{
"product_name": "zigcy-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.0.9",
"version_value": "2.0.9"
}
]
}
}
]
},
"vendor_name": "AccessPress Themes"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Chloe Chamberland, Wordfence"
},
{
"lang": "eng",
"value": "Lenon Leite"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer \u003c=1.0.6 WordPress Themes: accesspress-basic \u003c= 3.2.1 accesspress-lite \u003c= 2.92 accesspress-mag \u003c= 2.6.5 accesspress-parallax \u003c= 4.5 accesspress-root \u003c= 2.5 accesspress-store \u003c= 2.4.9 agency-lite \u003c= 1.1.6 arrival \u003c= 1.4.2 bingle \u003c= 1.0.4 bloger \u003c= 1.2.6 brovy \u003c= 1.3 construction-lite \u003c= 1.2.5 doko \u003c= 1.0.27 edict-lite \u003c= 1.1.4 eightlaw-lite \u003c= 2.1.5 eightmedi-lite \u003c= 2.1.8 eight-sec \u003c= 1.1.4 eightstore-lite \u003c= 1.2.5 enlighten \u003c= 1.3.5 fotography \u003c= 2.4.0 opstore \u003c= 1.4.3 parallaxsome \u003c= 1.3.6 punte \u003c= 1.1.2 revolve \u003c= 1.3.1 ripple \u003c= 1.2.0 sakala \u003c= 1.0.4 scrollme \u003c= 2.1.0 storevilla \u003c= 1.4.1 swing-lite \u003c= 1.1.9 the100 \u003c= 1.1.2 the-launcher \u003c= 1.3.2 the-monday \u003c= 1.4.1 ultra-seven \u003c= 1.2.8 uncode-lite \u003c= 1.3.3 vmag \u003c= 1.2.7 vmagazine-lite \u003c= 1.3.5 vmagazine-news \u003c= 1.0.5 wpparallax \u003c= 2.0.6 wp-store \u003c= 1.1.9 zigcy-baby \u003c= 1.0.6 zigcy-cosmetics \u003c= 1.0.5 zigcy-lite \u003c= 2.0.9"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285 Improper Authorization"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/",
"refsource": "MISC",
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"name": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php",
"refsource": "MISC",
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"name": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php",
"refsource": "MISC",
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"name": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/",
"refsource": "MISC",
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update to the latest available version of software for each, or uninstall from WordPress site if no updated software available."
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2021-39317",
"datePublished": "2021-10-11T15:48:57.291Z",
"dateReserved": "2021-08-20T00:00:00.000Z",
"dateUpdated": "2025-02-14T18:23:25.466Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23976 (GCVE-0-2022-23976)
Vulnerability from nvd – Published: 2022-04-18 16:20 – Updated: 2025-02-20 20:26
VLAI?
Title
WordPress Access Demo Importer plugin <= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Data Reset (Posts / Pages / Media)
Summary
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media).
Severity ?
8.1 (High)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AccessPress Themes | Access Demo Importer (WordPress plugin) |
Affected:
<= 1.0.7 , ≤ 1.0.7
(custom)
|
Credits
Vulnerability discovered by Ex.Mi (Patchstack)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:59:23.287Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-23976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-20T19:31:28.378289Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-20T20:26:33.800Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Access Demo Importer (WordPress plugin)",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.7",
"status": "affected",
"version": "\u003c= 1.0.7",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"datePublic": "2022-01-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-18T16:20:30.000Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Data Reset (Posts / Pages / Media)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "audit@patchstack.com",
"DATE_PUBLIC": "2022-01-24T12:01:00.000Z",
"ID": "CVE-2022-23976",
"STATE": "PUBLIC",
"TITLE": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Data Reset (Posts / Pages / Media)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Access Demo Importer (WordPress plugin)",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "\u003c= 1.0.7",
"version_value": "1.0.7"
}
]
}
}
]
},
"vendor_name": "AccessPress Themes"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media)."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/access-demo-importer/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"name": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media",
"refsource": "CONFIRM",
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-data-reset-posts-pages-media"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2022-23976",
"datePublished": "2022-04-18T16:20:30.233Z",
"dateReserved": "2022-01-26T00:00:00.000Z",
"dateUpdated": "2025-02-20T20:26:33.800Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23975 (GCVE-0-2022-23975)
Vulnerability from nvd – Published: 2022-04-18 16:20 – Updated: 2025-02-20 20:26
VLAI?
Title
WordPress Access Demo Importer plugin <= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary Plugin Activation
Summary
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to activate any installed plugin.
Severity ?
6.5 (Medium)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AccessPress Themes | Access Demo Importer (WordPress plugin) |
Affected:
<= 1.0.7 , ≤ 1.0.7
(custom)
|
Credits
Vulnerability discovered by Ex.Mi (Patchstack)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:59:23.306Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-23975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-20T19:31:23.751074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-20T20:26:24.958Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Access Demo Importer (WordPress plugin)",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.7",
"status": "affected",
"version": "\u003c= 1.0.7",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"datePublic": "2022-01-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to activate any installed plugin."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-18T16:20:30.000Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary Plugin Activation",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "audit@patchstack.com",
"DATE_PUBLIC": "2022-01-24T12:01:00.000Z",
"ID": "CVE-2022-23975",
"STATE": "PUBLIC",
"TITLE": "WordPress Access Demo Importer plugin \u003c= 1.0.7 - Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary Plugin Activation"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Access Demo Importer (WordPress plugin)",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "\u003c= 1.0.7",
"version_value": "1.0.7"
}
]
}
}
]
},
"vendor_name": "AccessPress Themes"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Vulnerability discovered by Ex.Mi (Patchstack)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF) in Access Demo Importer \u003c= 1.0.7 on WordPress allows an attacker to activate any installed plugin."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/access-demo-importer/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/access-demo-importer/#developers"
},
{
"name": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation",
"refsource": "CONFIRM",
"url": "https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update to 1.0.8 or higher version."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2022-23975",
"datePublished": "2022-04-18T16:20:30.943Z",
"dateReserved": "2022-01-26T00:00:00.000Z",
"dateUpdated": "2025-02-20T20:26:24.958Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39317 (GCVE-0-2021-39317)
Vulnerability from nvd – Published: 2021-10-11 15:48 – Updated: 2025-02-14 18:23
VLAI?
Title
AccessPress Themes - Authenticated Malicious File Upload
Summary
A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9
Severity ?
8.8 (High)
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| AccessPress Themes | Access Demo Importer |
Affected:
1.0.6 , ≤ 1.0.6
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Chloe Chamberland, Wordfence
Lenon Leite
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.686Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-39317",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-14T18:23:19.419703Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-14T18:23:25.466Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Access Demo Importer",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.6",
"status": "affected",
"version": "1.0.6",
"versionType": "custom"
}
]
},
{
"product": "accesspress-basic",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "3.2.1",
"status": "affected",
"version": "3.2.1",
"versionType": "custom"
}
]
},
{
"product": "accesspress-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.9.2",
"status": "affected",
"version": "2.9.2",
"versionType": "custom"
}
]
},
{
"product": "accesspress-mag",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.6.5",
"status": "affected",
"version": "2.6.5",
"versionType": "custom"
}
]
},
{
"product": "accesspress-parallax",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "4.5",
"status": "affected",
"version": "4.5",
"versionType": "custom"
}
]
},
{
"product": "accesspress-root",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.5",
"status": "affected",
"version": "2.5",
"versionType": "custom"
}
]
},
{
"product": "accesspress-store",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.4.9",
"status": "affected",
"version": "2.4.9",
"versionType": "custom"
}
]
},
{
"product": "agency-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.6",
"status": "affected",
"version": "1.1.6",
"versionType": "custom"
}
]
},
{
"product": "arrival",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.2",
"status": "affected",
"version": "1.4.2",
"versionType": "custom"
}
]
},
{
"product": "bingle",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.4",
"status": "affected",
"version": "1.0.4",
"versionType": "custom"
}
]
},
{
"product": "bloger",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.6",
"status": "affected",
"version": "1.2.6",
"versionType": "custom"
}
]
},
{
"product": "brovy",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3",
"status": "affected",
"version": "1.3",
"versionType": "custom"
}
]
},
{
"product": "construction-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.5",
"status": "affected",
"version": "1.2.5",
"versionType": "custom"
}
]
},
{
"product": "doko",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.27",
"status": "affected",
"version": "1.0.27",
"versionType": "custom"
}
]
},
{
"product": "edict-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.4",
"status": "affected",
"version": "1.1.4",
"versionType": "custom"
}
]
},
{
"product": "enlighten",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.5",
"status": "affected",
"version": "1.3.5",
"versionType": "custom"
}
]
},
{
"product": "fotography",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.4.0",
"status": "affected",
"version": "2.4.0",
"versionType": "custom"
}
]
},
{
"product": "opstore",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.3",
"status": "affected",
"version": "1.4.3",
"versionType": "custom"
}
]
},
{
"product": "parallaxsome",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.6",
"status": "affected",
"version": "1.3.6",
"versionType": "custom"
}
]
},
{
"product": "punte",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.2",
"status": "affected",
"version": "1.1.2",
"versionType": "custom"
}
]
},
{
"product": "revolve",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.1",
"status": "affected",
"version": "1.3.1",
"versionType": "custom"
}
]
},
{
"product": "ripple",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.0",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
}
]
},
{
"product": "sakala",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.4",
"status": "affected",
"version": "1.0.4",
"versionType": "custom"
}
]
},
{
"product": "scrollme",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.1.0",
"status": "affected",
"version": "2.1.0",
"versionType": "custom"
}
]
},
{
"product": "storevilla",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.1",
"status": "affected",
"version": "1.4.1",
"versionType": "custom"
}
]
},
{
"product": "swing-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.9",
"status": "affected",
"version": "1.1.9",
"versionType": "custom"
}
]
},
{
"product": "swing-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.9",
"status": "affected",
"version": "1.1.9",
"versionType": "custom"
}
]
},
{
"product": "the100",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.2",
"status": "affected",
"version": "1.1.2",
"versionType": "custom"
}
]
},
{
"product": "the-launcher",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.2",
"status": "affected",
"version": "1.3.2",
"versionType": "custom"
}
]
},
{
"product": "the-monday",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.4.1",
"status": "affected",
"version": "1.4.1",
"versionType": "custom"
}
]
},
{
"product": "ultra-seven",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.8",
"status": "affected",
"version": "1.2.8",
"versionType": "custom"
}
]
},
{
"product": "uncode-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.3",
"status": "affected",
"version": "1.3.3",
"versionType": "custom"
}
]
},
{
"product": "vmag",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.2.7",
"status": "affected",
"version": "1.2.7",
"versionType": "custom"
}
]
},
{
"product": "vmagazine-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.3.5",
"status": "affected",
"version": "1.3.5",
"versionType": "custom"
}
]
},
{
"product": "vmagazine-news",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.5",
"status": "affected",
"version": "1.0.5",
"versionType": "custom"
}
]
},
{
"product": "wpparallax",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.0.6",
"status": "affected",
"version": "2.0.6",
"versionType": "custom"
}
]
},
{
"product": "wp-store",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.1.9",
"status": "affected",
"version": "1.1.9",
"versionType": "custom"
}
]
},
{
"product": "zigcy-baby",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.6",
"status": "affected",
"version": "1.0.6",
"versionType": "custom"
}
]
},
{
"product": "zigcy-cosmetics",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "1.0.5",
"status": "affected",
"version": "1.0.5",
"versionType": "custom"
}
]
},
{
"product": "zigcy-lite",
"vendor": "AccessPress Themes",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.9",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Chloe Chamberland, Wordfence"
},
{
"lang": "en",
"value": "Lenon Leite"
}
],
"datePublic": "2021-10-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer \u003c=1.0.6 WordPress Themes: accesspress-basic \u003c= 3.2.1 accesspress-lite \u003c= 2.92 accesspress-mag \u003c= 2.6.5 accesspress-parallax \u003c= 4.5 accesspress-root \u003c= 2.5 accesspress-store \u003c= 2.4.9 agency-lite \u003c= 1.1.6 arrival \u003c= 1.4.2 bingle \u003c= 1.0.4 bloger \u003c= 1.2.6 brovy \u003c= 1.3 construction-lite \u003c= 1.2.5 doko \u003c= 1.0.27 edict-lite \u003c= 1.1.4 eightlaw-lite \u003c= 2.1.5 eightmedi-lite \u003c= 2.1.8 eight-sec \u003c= 1.1.4 eightstore-lite \u003c= 1.2.5 enlighten \u003c= 1.3.5 fotography \u003c= 2.4.0 opstore \u003c= 1.4.3 parallaxsome \u003c= 1.3.6 punte \u003c= 1.1.2 revolve \u003c= 1.3.1 ripple \u003c= 1.2.0 sakala \u003c= 1.0.4 scrollme \u003c= 2.1.0 storevilla \u003c= 1.4.1 swing-lite \u003c= 1.1.9 the100 \u003c= 1.1.2 the-launcher \u003c= 1.3.2 the-monday \u003c= 1.4.1 ultra-seven \u003c= 1.2.8 uncode-lite \u003c= 1.3.3 vmag \u003c= 1.2.7 vmagazine-lite \u003c= 1.3.5 vmagazine-news \u003c= 1.0.5 wpparallax \u003c= 2.0.6 wp-store \u003c= 1.1.9 zigcy-baby \u003c= 1.0.6 zigcy-cosmetics \u003c= 1.0.5 zigcy-lite \u003c= 2.0.9"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285 Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-13T20:27:30.000Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to the latest available version of software for each, or uninstall from WordPress site if no updated software available."
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "AccessPress Themes - Authenticated Malicious File Upload",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"AKA": "Wordfence",
"ASSIGNER": "security@wordfence.com",
"DATE_PUBLIC": "2021-10-06T19:17:00.000Z",
"ID": "CVE-2021-39317",
"STATE": "PUBLIC",
"TITLE": "AccessPress Themes - Authenticated Malicious File Upload"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Access Demo Importer",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.6",
"version_value": "1.0.6"
}
]
}
},
{
"product_name": "accesspress-basic",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.2.1",
"version_value": "3.2.1"
}
]
}
},
{
"product_name": "accesspress-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.9.2",
"version_value": "2.9.2"
}
]
}
},
{
"product_name": "accesspress-mag",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.6.5",
"version_value": "2.6.5"
}
]
}
},
{
"product_name": "accesspress-parallax",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "4.5",
"version_value": "4.5"
}
]
}
},
{
"product_name": "accesspress-root",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.5",
"version_value": "2.5"
}
]
}
},
{
"product_name": "accesspress-store",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.4.9",
"version_value": "2.4.9"
}
]
}
},
{
"product_name": "agency-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.6",
"version_value": "1.1.6"
}
]
}
},
{
"product_name": "arrival",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.2",
"version_value": "1.4.2"
}
]
}
},
{
"product_name": "bingle",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.4",
"version_value": "1.0.4"
}
]
}
},
{
"product_name": "bloger",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.6",
"version_value": "1.2.6"
}
]
}
},
{
"product_name": "brovy",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3",
"version_value": "1.3"
}
]
}
},
{
"product_name": "construction-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.5",
"version_value": "1.2.5"
}
]
}
},
{
"product_name": "doko",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.27",
"version_value": "1.0.27"
}
]
}
},
{
"product_name": "edict-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.4",
"version_value": "1.1.4"
}
]
}
},
{
"product_name": "enlighten",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.5",
"version_value": "1.3.5"
}
]
}
},
{
"product_name": "fotography",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.4.0",
"version_value": "2.4.0"
}
]
}
},
{
"product_name": "opstore",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.3",
"version_value": "1.4.3"
}
]
}
},
{
"product_name": "parallaxsome",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.6",
"version_value": "1.3.6"
}
]
}
},
{
"product_name": "punte",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.2",
"version_value": "1.1.2"
}
]
}
},
{
"product_name": "revolve",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.1",
"version_value": "1.3.1"
}
]
}
},
{
"product_name": "ripple",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.0",
"version_value": "1.2.0"
}
]
}
},
{
"product_name": "sakala",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.4",
"version_value": "1.0.4"
}
]
}
},
{
"product_name": "scrollme",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.1.0",
"version_value": "2.1.0"
}
]
}
},
{
"product_name": "storevilla",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.1",
"version_value": "1.4.1"
}
]
}
},
{
"product_name": "swing-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.9",
"version_value": "1.1.9"
}
]
}
},
{
"product_name": "swing-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.9",
"version_value": "1.1.9"
}
]
}
},
{
"product_name": "the100",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.2",
"version_value": "1.1.2"
}
]
}
},
{
"product_name": "the-launcher",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.2",
"version_value": "1.3.2"
}
]
}
},
{
"product_name": "the-monday",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.4.1",
"version_value": "1.4.1"
}
]
}
},
{
"product_name": "ultra-seven",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.8",
"version_value": "1.2.8"
}
]
}
},
{
"product_name": "uncode-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.3",
"version_value": "1.3.3"
}
]
}
},
{
"product_name": "vmag",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.2.7",
"version_value": "1.2.7"
}
]
}
},
{
"product_name": "vmagazine-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.3.5",
"version_value": "1.3.5"
}
]
}
},
{
"product_name": "vmagazine-news",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.5",
"version_value": "1.0.5"
}
]
}
},
{
"product_name": "wpparallax",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.0.6",
"version_value": "2.0.6"
}
]
}
},
{
"product_name": "wp-store",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.1.9",
"version_value": "1.1.9"
}
]
}
},
{
"product_name": "zigcy-baby",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.6",
"version_value": "1.0.6"
}
]
}
},
{
"product_name": "zigcy-cosmetics",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "1.0.5",
"version_value": "1.0.5"
}
]
}
},
{
"product_name": "zigcy-lite",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.0.9",
"version_value": "2.0.9"
}
]
}
}
]
},
"vendor_name": "AccessPress Themes"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Chloe Chamberland, Wordfence"
},
{
"lang": "eng",
"value": "Lenon Leite"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer \u003c=1.0.6 WordPress Themes: accesspress-basic \u003c= 3.2.1 accesspress-lite \u003c= 2.92 accesspress-mag \u003c= 2.6.5 accesspress-parallax \u003c= 4.5 accesspress-root \u003c= 2.5 accesspress-store \u003c= 2.4.9 agency-lite \u003c= 1.1.6 arrival \u003c= 1.4.2 bingle \u003c= 1.0.4 bloger \u003c= 1.2.6 brovy \u003c= 1.3 construction-lite \u003c= 1.2.5 doko \u003c= 1.0.27 edict-lite \u003c= 1.1.4 eightlaw-lite \u003c= 2.1.5 eightmedi-lite \u003c= 2.1.8 eight-sec \u003c= 1.1.4 eightstore-lite \u003c= 1.2.5 enlighten \u003c= 1.3.5 fotography \u003c= 2.4.0 opstore \u003c= 1.4.3 parallaxsome \u003c= 1.3.6 punte \u003c= 1.1.2 revolve \u003c= 1.3.1 ripple \u003c= 1.2.0 sakala \u003c= 1.0.4 scrollme \u003c= 2.1.0 storevilla \u003c= 1.4.1 swing-lite \u003c= 1.1.9 the100 \u003c= 1.1.2 the-launcher \u003c= 1.3.2 the-monday \u003c= 1.4.1 ultra-seven \u003c= 1.2.8 uncode-lite \u003c= 1.3.3 vmag \u003c= 1.2.7 vmagazine-lite \u003c= 1.3.5 vmagazine-news \u003c= 1.0.5 wpparallax \u003c= 2.0.6 wp-store \u003c= 1.1.9 zigcy-baby \u003c= 1.0.6 zigcy-cosmetics \u003c= 1.0.5 zigcy-lite \u003c= 2.0.9"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285 Improper Authorization"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/",
"refsource": "MISC",
"url": "https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/"
},
{
"name": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php",
"refsource": "MISC",
"url": "https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"name": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php",
"refsource": "MISC",
"url": "https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php"
},
{
"name": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/",
"refsource": "MISC",
"url": "https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update to the latest available version of software for each, or uninstall from WordPress site if no updated software available."
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2021-39317",
"datePublished": "2021-10-11T15:48:57.291Z",
"dateReserved": "2021-08-20T00:00:00.000Z",
"dateUpdated": "2025-02-14T18:23:25.466Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}