The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed
CVE Status: Modified
Attribute | Value |
---|---|
Attack Complexity | LOW |
Attack Vector | NETWORK |
Availability Impact | NONE |
Base Score | 4.8 |
Base Severity | MEDIUM |
Confidentiality Impact | LOW |
Integrity Impact | LOW |
Privileges Required | HIGH |
Scope | CHANGED |
User Interaction | REQUIRED |
Vector String | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
Exploitability Score | 1.7 |
Impact Score | 2.7 |
Source | [email protected] |
Type | Primary |