The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: WPScan

Published: 2022-03-28T17:23:26

Updated: 2023-07-05T07:29:30.316Z

Reserved: 2022-03-02T00:00:00


Link: CVE-2022-0833

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-03-28T18:15:09.893

Modified: 2023-11-07T03:41:35.010


Link: CVE-2022-0833

JSON object: View

cve-icon Redhat Information

No data.