NVD Vulnerability Detail
Search Exploit, PoC
CVE-2020-10257
Summary

The ThemeREX Addons plugin before 2020-03-09 for WordPress lacks access control on the /trx_addons/v2/get/sc_layout REST API endpoint, allowing for PHP functions to be executed by any users, because includes/plugin.rest-api.php calls trx_addons_rest_get_sc_layout with an unsafe sc parameter.

Publication Date March 10, 2020, 9:15 a.m.
Registration Date Jan. 26, 2021, 11:50 a.m.
Last Update Nov. 21, 2024, 1:55 p.m.
CVSS3.1 : CRITICAL
スコア 9.8
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
CVSS2.0 : HIGH
Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
Configuration2 or higher or less more than less than
Configuration3 or higher or less more than less than
Configuration4 or higher or less more than less than
Configuration5 or higher or less more than less than
Configuration6 or higher or less more than less than
Configuration7 or higher or less more than less than
Configuration8 or higher or less more than less than
Configuration9 or higher or less more than less than
Configuration10 or higher or less more than less than
Configuration11 or higher or less more than less than
Configuration12 or higher or less more than less than
Configuration13 or higher or less more than less than
Configuration14 or higher or less more than less than
Configuration15 or higher or less more than less than
Configuration16 or higher or less more than less than
Configuration17 or higher or less more than less than
Configuration18 or higher or less more than less than
Configuration19 or higher or less more than less than
Configuration20 or higher or less more than less than
Configuration21 or higher or less more than less than
Configuration22 or higher or less more than less than
Configuration23 or higher or less more than less than
Configuration24 or higher or less more than less than
Configuration25 or higher or less more than less than
Configuration26 or higher or less more than less than
Configuration27 or higher or less more than less than
Configuration28 or higher or less more than less than
Configuration29 or higher or less more than less than
Configuration30 or higher or less more than less than
Configuration31 or higher or less more than less than
Configuration32 or higher or less more than less than
Configuration33 or higher or less more than less than
Configuration34 or higher or less more than less than
Configuration35 or higher or less more than less than
Configuration36 or higher or less more than less than
Configuration37 or higher or less more than less than
Configuration38 or higher or less more than less than
Configuration39 or higher or less more than less than
Configuration40 or higher or less more than less than
Configuration41 or higher or less more than less than
Configuration42 or higher or less more than less than
Configuration43 or higher or less more than less than
Configuration44 or higher or less more than less than
Configuration45 or higher or less more than less than
Configuration46 or higher or less more than less than
Configuration47 or higher or less more than less than
Configuration48 or higher or less more than less than
Configuration49 or higher or less more than less than
Configuration50 or higher or less more than less than
Configuration51 or higher or less more than less than
Configuration52 or higher or less more than less than
Configuration53 or higher or less more than less than
Configuration54 or higher or less more than less than
Configuration55 or higher or less more than less than
Configuration56 or higher or less more than less than
Configuration57 or higher or less more than less than
Configuration58 or higher or less more than less than
Configuration59 or higher or less more than less than
Configuration60 or higher or less more than less than
Configuration61 or higher or less more than less than
Configuration62 or higher or less more than less than
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
WordPress 用 ThemeREX Addons プラグインにおけるコードインジェクションの脆弱性
Title WordPress 用 ThemeREX Addons プラグインにおけるコードインジェクションの脆弱性
Summary

WordPress 用 ThemeREX Addons プラグインには、コードインジェクションの脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date March 9, 2020, midnight
Registration Date March 19, 2020, 10:21 a.m.
Last Update March 19, 2020, 10:21 a.m.
Affected System
ThemeREX
Addons 
Chit Club - Board Games 
Hallelujah - Church 
Helion - Agency & Portfolio 
Nelson - Barbershop + Tattoo Salon 
Ozeum - Museum 
Prider - Pride Fest 
Right Way 
Yottis - Simple Portfolio 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2020年03月19日]
  掲載
March 19, 2020, 10:21 a.m.