Vulnerability Description
WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files is prone to multiple vulnerabilities, including open proxy and security bypass vulnerabilities because it fails to properly verify user-supplied input. An attacker may leverage these issues to hide attacks directed at a target site from behind vulnerable website or to perform otherwise restricted actions and subsequently download files with the extension mp3, mp4a, wav and ogg from anywhere the web server application has read access to the system. WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files version 1.7.6 is vulnerable; prior versions may also be affected.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mb.Miniaudioplayer Project | Mb.Miniaudioplayer | <= 1.7.6 |
Related Weaknesses (CWE)
References
- http://www.vapidlabs.com/advisory.php?v=162ExploitThird Party Advisory
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mb-miniaudioplayerExploitThird Party Advisory
- http://www.vapidlabs.com/advisory.php?v=162ExploitThird Party Advisory
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mb-miniaudioplayerExploitThird Party Advisory
FAQ
What is CVE-2016-0796?
CVE-2016-0796 is a vulnerability with a CVSS score of 7.5 (HIGH). WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files is prone to multiple vulnerabilities, including open proxy and security bypass vulnerabilities because it fails to properly...
How severe is CVE-2016-0796?
CVE-2016-0796 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-0796?
Check the references section above for vendor advisories and patch information. Affected products include: Mb.Miniaudioplayer Project Mb.Miniaudioplayer.