Remote Code Execution Vulnerability in WP EasyCart Plugin
CVE-2015-2673
8.8HIGH
Summary
The WP EasyCart plugin versions 1.1.30 through 3.0.20 for WordPress are susceptible to a vulnerability that allows remote attackers to exploit the ec_ajax_update_option and ec_ajax_clear_all_taxrates functions. By manipulating the option_name and option_value parameters, attackers can gain elevated administrator privileges and execute arbitrary code on the server, potentially leading to further security breaches.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved