CVE-2022-0424
Popup by Supsystic < 1.10.9 - Unauthenticated Subscriber Email Addresses Disclosure
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users
El plugin Popup by Supsystic de WordPress versiones hasta 1.10.9, no dispone de autenticación y autorización en una acción AJAX, permitiendo a atacantes no autenticados llamarlo y obtener las direcciones de correo electrónico de los usuarios suscritos
*Credits:
Felipe de Avila
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-01-31 CVE Reserved
- 2022-04-18 CVE Published
- 2024-04-11 EPSS Updated
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-306: Missing Authentication for Critical Function
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|