CVE-2019-20360

Current Description

A flaw in Give before 2.5.5, a WordPress plugin, allowed unauthenticated users to bypass API authentication methods and access personally identifiable user information (PII) including names, addresses, IP addresses, and email addresses. Once an API key has been set to any meta key value from the wp_usermeta table, and the token is set to the corresponding MD5 hash of the meta key selected, one can make a request to the restricted endpoints, and thus access sensitive donor data.

Basic Data

PublishedJanuary 08, 2020
Last ModifiedJanuary 09, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-287
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationImpressGivewp*****wordpress**2.5.5

Vulnerable Software List

VendorProductVersions
Impress Givewp *

References

NameSourceURLTags
https://wpvulndb.com/vulnerabilities/9889https://wpvulndb.com/vulnerabilities/9889MISCThird Party Advisory
https://www.wordfence.com/blog/2019/09/authentication-bypass-vulnerability-in-givewp-plugin/https://www.wordfence.com/blog/2019/09/authentication-bypass-vulnerability-in-givewp-plugin/MISCExploit Third Party Advisory