Description
The Adning Advertising plugin for WordPress is vulnerable to file deletion via path traversal in versions up to, and including, 1.5.5. This allows unauthenticated attackers to delete arbitrary files which can be used to reset and gain full control of a site.
Published: 2023-06-07
Score: 6.5 Medium
EPSS: 84.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Dec 2024 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Tunasite Adning Advertising
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-12-28T00:52:25.533Z

Reserved: 2023-06-06T13:25:36.150Z

Link: CVE-2020-36728

cve-icon Vulnrichment

Updated: 2024-08-04T17:37:06.854Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T13:15:09.330

Modified: 2024-11-21T05:30:10.553

Link: CVE-2020-36728

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.