FKIE_CVE-2020-36721
Vulnerability from fkie_nvd - Published: 2023-06-07 02:15 - Updated: 2024-11-21 05:30
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Summary
The Brilliance <= 1.2.7, Activello <= 1.4.0, and Newspaper X <= 1.3.1 themes for WordPress are vulnerable to Plugin Activation/Deactivation. This is due to the 'activello_activate_plugin' and 'activello_deactivate_plugin' functions in the 'inc/welcome-screen/class-activello-welcome.php' file missing capability and security checks/nonces. This makes it possible for unauthenticated attackers to activate and deactivate arbitrary plugins installed on a vulnerable site.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| colorlib | activello | * | |
| colorlib | bonkers | * | |
| colorlib | illdy | * | |
| colorlib | newspaper_x | * | |
| colorlib | pixova_lite | * | |
| colorlib | shapely | * | |
| cpothemes | affluent | * | |
| cpothemes | allegiant | * | |
| cpothemes | brilliance | * | |
| cpothemes | transcend | * | |
| machothemes | antreas | * | |
| machothemes | medzone_lite | * | |
| machothemes | naturemag_lite | * | |
| machothemes | newsmag | * | |
| machothemes | regina_lite | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:colorlib:activello:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "20F70FFD-999C-4672-926C-F78D405E6ED5",
"versionEndExcluding": "1.4.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:colorlib:bonkers:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "DE235C7C-524F-4F32-883D-115D0AF9E462",
"versionEndExcluding": "1.0.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:colorlib:illdy:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BDC1B168-E097-43C0-A8F5-43BA25834F55",
"versionEndExcluding": "2.1.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:colorlib:newspaper_x:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "3FD10FA9-4FE5-430A-8FA2-8882D9ECB5F6",
"versionEndExcluding": "1.3.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:colorlib:pixova_lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6A44700A-58BA-40AB-9D71-1514B16E56F7",
"versionEndExcluding": "2.0.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:colorlib:shapely:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "93F26484-75E0-4A08-9F37-5E4F5D8A3533",
"versionEndExcluding": "1.2.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpothemes:affluent:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "CB3BF51C-DD4E-4C00-A428-806E713C1341",
"versionEndExcluding": "1.1.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpothemes:allegiant:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "8408B788-263E-4894-B2D8-E91788520E7E",
"versionEndExcluding": "1.2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpothemes:brilliance:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EE397C03-FF9C-4BE2-B773-30ADB40AA417",
"versionEndExcluding": "1.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpothemes:transcend:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "ACF002FE-F3F5-4B2C-BE98-BAD745A0BA65",
"versionEndExcluding": "1.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:machothemes:antreas:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BFB5368B-FE3E-4A9C-A351-FBE3B67E856C",
"versionEndExcluding": "1.0.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:machothemes:medzone_lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "998D7CCC-8F2C-4710-B556-FC0BFA81F992",
"versionEndExcluding": "1.2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:machothemes:naturemag_lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "49D15762-F26C-4387-83D4-253F64E4F864",
"versionEndIncluding": "1.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:machothemes:newsmag:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "54B7C2E2-A35D-4E32-BDC3-3DCD31871F1B",
"versionEndExcluding": "2.4.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:machothemes:regina_lite:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B87758A3-D7A9-4635-88CA-436D00EFE4E4",
"versionEndExcluding": "2.0.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Brilliance \u003c= 1.2.7, Activello \u003c= 1.4.0, and Newspaper X \u003c= 1.3.1 themes for WordPress are vulnerable to Plugin Activation/Deactivation. This is due to the \u0027activello_activate_plugin\u0027 and \u0027activello_deactivate_plugin\u0027 functions in the \u0027inc/welcome-screen/class-activello-welcome.php\u0027 file missing capability and security checks/nonces. This makes it possible for unauthenticated attackers to activate and deactivate arbitrary plugins installed on a vulnerable site."
}
],
"id": "CVE-2020-36721",
"lastModified": "2024-11-21T05:30:09.553",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "security@wordfence.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-07T02:15:12.297",
"references": [
{
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-fixed-in-15-wordpress-themes/"
},
{
"source": "security@wordfence.com",
"tags": [
"Product"
],
"url": "https://wordpress.org/themes/activello/"
},
{
"source": "security@wordfence.com",
"tags": [
"Product"
],
"url": "https://wordpress.org/themes/brilliance/"
},
{
"source": "security@wordfence.com",
"tags": [
"Product"
],
"url": "https://wordpress.org/themes/newspaper-x/"
},
{
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4e989-8e55-4ea7-8f42-9f67cfab1168?source=cve"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-fixed-in-15-wordpress-themes/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://wordpress.org/themes/activello/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://wordpress.org/themes/brilliance/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://wordpress.org/themes/newspaper-x/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4e989-8e55-4ea7-8f42-9f67cfab1168?source=cve"
}
],
"sourceIdentifier": "security@wordfence.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…