Multiple Vulnerabilities in Database Reset Plugin for WordPress
Overview
Multiple vulnerabilities have been reported in Database Reset Plugin for WordPress which could be exploited by a remote attacker
to gain elevated privileges leading to complete compromise of the targeted system.
Description
2.Authentication bypass Vulnerability ( CVE-2020-7048 )
This vulnerability exists in the WP Database Reset plugin due to improper security controls. A remote attacker could exploit this
vulnerability by sending a specially crafted request to the affected system.
Successful exploitation of this vulnerability could allow the attacker to reset any table in the database, and thus delete all
website content.
Multiple vulnerabilities have been reported in Database Reset Plugin for WordPress which could be exploited by a remote attacker
to gain elevated privileges leading to complete compromise of the targeted system.
Description
1.Privilege Escalation Vulnerability ( CVE-2020-7047 )
This vulnerability exists in the WP Database Reset plugin due to improper security controls. A remote attacker could exploit this
vulnerability by sending a specially crafted request to the affected system.
Successful exploitation of this vulnerability could allow the attacker to gain elevated privileges on the targeted system.
This vulnerability exists in the WP Database Reset plugin due to improper security controls. A remote attacker could exploit this
vulnerability by sending a specially crafted request to the affected system.
Successful exploitation of this vulnerability could allow the attacker to gain elevated privileges on the targeted system.
2.Authentication bypass Vulnerability ( CVE-2020-7048 )
This vulnerability exists in the WP Database Reset plugin due to improper security controls. A remote attacker could exploit this
vulnerability by sending a specially crafted request to the affected system.
Successful exploitation of this vulnerability could allow the attacker to reset any table in the database, and thus delete all
website content.
Comments
Post a Comment