CVE-2020-10195
Popup Builder <= 3.63 - Authenticated Settings Modification, Configuration Disclosure, and User Data Export
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The popup-builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info.
El plugin popup-builder versiones anteriores a 3.64.1 para WordPress, permite una divulgación de información y una modificación de la configuración, conllevando a una escalada de privilegios en el ámbito de aplicación por medio de una acción admin-post al archivo com/classes/Actions.php. Mediante el envío de una petición POST hacia el archivo wp-admin/admin-post.php, un atacante autenticado con permisos mínimos (nivel subscriber) puede modificar la configuración del plugin para permitir a cualquier rol (incluyendo subscriber) acceder a la funcionalidad del plugin al establecer el parámetro action en sgpbSaveSettings, exportar una lista de suscriptores actuales del boletín al establecer el parámetro action en csv_file, u obtener información de configuración del sistema incluyendo configuración del webserver y una lista de plugins instalados al establecer el parámetro action en sgpb_system_info.
The Popup Builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-06 CVE Reserved
- 2020-03-12 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-10-27 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://wpvulndb.com/vulnerabilities/10127 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.wordfence.com/blog/2020/03/vulnerabilities-patched-in-popup-builder-plugin-affecting-over-100000-sites | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sygnoos Search vendor "Sygnoos" | Popup-builder Search vendor "Sygnoos" for product "Popup-builder" | < 3.64.1 Search vendor "Sygnoos" for product "Popup-builder" and version " < 3.64.1" | wordpress |
Affected
|