Vulnerability Description
The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Church Admin Project | Church Admin | < 3.4.135 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965dExploitThird Party Advisory
- https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965dExploitThird Party Advisory
FAQ
What is CVE-2022-0833?
CVE-2022-0833 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "re...
How severe is CVE-2022-0833?
CVE-2022-0833 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0833?
Check the references section above for vendor advisories and patch information. Affected products include: Church Admin Project Church Admin.