The TI WooCommerce Wishlist and TI WooCommerce Wishlist Pro plugins for WordPress are vulnerable to an Options Change vulnerability in versions up to, and including, 1.21.11 and 1.21.4 via the 'ti-woocommerce-wishlist/includes/export.class.php' file. This makes it possible for authenticated attackers to gain otherwise restricted access to the vulnerable blog and update any settings.
References
Link | Resource |
---|---|
https://blog.nintechnet.com/critical-zero-day-vulnerability-fixed-in-wordpress-ti-woocommerce-wishlist-plugin/ | Exploit Third Party Advisory |
https://templateinvaders.com/changelogs/ti-woocommerce-wishlist-plugin-changelog/ | Release Notes |
https://wpscan.com/vulnerability/2e2fb815-7cca-4e6c-b466-179337fe99ee | Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/d60b5741-5496-4e87-bcb0-adaa0db07d90?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-06-07T01:51:45.136Z
Updated: 2023-06-07T01:51:45.136Z
Reserved: 2023-06-06T13:19:52.903Z
Link: CVE-2020-36725
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-07T02:15:12.553
Modified: 2023-11-07T03:22:29.910
Link: CVE-2020-36725
JSON object: View
Redhat Information
No data.
CWE