CVE-2020-36730
high-risk
Published 2023-06-07
The CMP for WordPress is vulnerable to authorization bypass due to a missing capability check on the cmp_get_post_detail(), niteo_export_csv(), and cmp_disable_comingsoon_ajax() functions in versions up to, and including, 3.8.1. This makes it possible for unauthenticated attackers to read posts, export subscriber lists, and/or deactivate the plugin.
Do I need to act?
!
46.4% chance of exploitation in next 30 days
EPSS score — higher than 54% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.3/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://wpscan.com/vulnerability/10341
Third Party Advisory
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-cmp-coming-soon-ma...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/f1ef067b-e4b4-4174-b6f...
Third Party Advisory
https://wpscan.com/vulnerability/10341
Third Party Advisory
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-cmp-coming-soon-ma...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/f1ef067b-e4b4-4174-b6f...
51
/ 100
high-risk
Severity
29/34 · Critical
Exploitability
17/34 · Moderate
Exposure
5/34 · Minimal