Published on August 23rd, 2019 📆 | 2673 Views ⚑
0ad-inserter Plugin up to 2.4.21 on WordPress Remote Code Execution
https://www.ispeech.org/text.to.speech
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
6.0 | $0-$5k |
A vulnerability has been found in ad-inserter Plugin up to 2.4.21 on WordPress (WordPress Plugin) and classified as critical. This vulnerability affects some unknown functionality. The manipulation with an unknown input leads to a privilege escalation vulnerability (Code Execution). The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was shared 08/22/2019. This vulnerability was named CVE-2019-15324 since 08/21/2019. The attack can be initiated remotely. The technical details are unknown and an exploit is not available.
Upgrading to version 2.4.22 eliminates this vulnerability.
The entry 140673 is related to this item.
Type
Name
VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0
VulDB Base Score: β6.3
VulDB Temp Score: β6.0
VulDB Vector: π
VulDB Reliability: π
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Privilege escalation / Code Execution (CWE-269)
Local: No
Remote: Yes
Availability: π
Status: Not defined
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: Upgrade
Status: π
0-Day Time: π
Upgrade: ad-inserter Plugin 2.4.22
08/21/2019 CVE assigned
08/22/2019 Advisory disclosed
08/23/2019 VulDB entry created
08/23/2019 VulDB last update
CVE: CVE-2019-15324 (π)
See also: πCreated: 08/23/2019 09:13 AM
Complete: π
Use the official API to access entries easily!
https://vuldb.com/?id.140674
Gloss