Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-15816 |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
WP Private Content Plus Web applications / Modules and components for CMS |
Vendor | Rakhitha Nimesh |
Security Bulletin
This security bulletin contains information about 1 vulnerabilities.
EUVDB-ID: #VU20434
Risk: High
CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2019-15816
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote non-authenticated attacker can bypass implemented security restrictions and change plugin configuration.
MitigationInstall update from vendor's website.
Vulnerable software versionsWP Private Content Plus: 1.0 - 1.31
External linkshttp://blog.nintechnet.com/unauthenticated-options-change-vulnerability-in-wordpress-wp-private-con...
http://plugins.trac.wordpress.org/changeset/2145057/wp-private-content-plus
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.