Files
CVEs-PoC/2020/CVE-2020-10195.md
T
2024-06-18 02:51:15 +02:00

18 lines
1.2 KiB
Markdown

### [CVE-2020-10195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10195)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The popup-builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info.
### POC
#### Reference
- https://wpvulndb.com/vulnerabilities/10127
#### Github
No PoCs found on GitHub currently.