Access Control Flaw in WP ULike Plugin Affects WordPress Sites
CVE-2018-1000511
7.5HIGH
Summary
The WP ULike plugin versions 2.8.1 and 3.1 have a flaw in their AJAX implementation that allows unauthorized users to delete records from specific database tables. This vulnerability is exploited through specially crafted AJAX requests, posing a risk to data integrity. Users are advised to upgrade to version 3.2 or later to mitigate this issue.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved