CVE-2020-13700

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-13700
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13700.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-13700
Aliases
Published
2020-06-24T15:15:11Z
Modified
2024-05-14T07:39:14.057375Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress. It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values.

References

Affected packages

Git / github.com/airesvsg/acf-to-rest-api

Affected ranges

Type
GIT
Repo
https://github.com/airesvsg/acf-to-rest-api
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*

2.2.0
2.2.1

3.*

3.0.0-beta
3.0.1-beta
3.0.2
3.0.2-beta
3.1.0