Vulnerability Description
The NEX-Forms. plugin for WordPress is vulnerable to unauthorized disclosure and modification of data in versions up to, and including 7.7.1 due to missing capability checks on several AJAX actions. This makes it possible for authenticated attackers with subscriber level permissions and above to invoke these functions which can be used to perform actions like modify form submission records, deleting files, sending test emails, modifying plugin settings, and more.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Basixonline | Nex-Forms | <= 7.7.1 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2427162/Patch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/01940eeb-b4a6-450d-b64
- https://plugins.trac.wordpress.org/changeset/2427162/Patch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/01940eeb-b4a6-450d-b64Third Party Advisory
FAQ
What is CVE-2020-36670?
CVE-2020-36670 is a vulnerability with a CVSS score of 6.3 (MEDIUM). The NEX-Forms. plugin for WordPress is vulnerable to unauthorized disclosure and modification of data in versions up to, and including 7.7.1 due to missing capability checks on several AJAX actions. T...
How severe is CVE-2020-36670?
CVE-2020-36670 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-36670?
Check the references section above for vendor advisories and patch information. Affected products include: Basixonline Nex-Forms.