Vulnerability Description
The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan WordPress plugin before 4.20 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Antihacker Project | Antihacker | < 4.20 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14eExploitThird Party Advisory
- https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14eExploitThird Party Advisory
FAQ
What is CVE-2022-3880?
CVE-2022-3880 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan WordPress plugin before 4.20 does not have proper authorisation and CSRF in an AJAX action, allowing any ...
How severe is CVE-2022-3880?
CVE-2022-3880 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3880?
Check the references section above for vendor advisories and patch information. Affected products include: Antihacker Project Antihacker.