Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:auth0:login_by_auth0:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AEF5427B-E416-4F67-8D3D-FE113B53E030", "versionEndExcluding": "4.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in the Login by Auth0 plugin before 4.0.0 for WordPress. It has numerous fields that can contain data that is pulled from different sources. One issue with this is that the data isn't sanitized, and no input validation is performed, before the exporting of the user data. This can lead to (at least) CSV injection if a crafted Excel document is uploaded."}, {"lang": "es", "value": "Se detect\u00f3 un problema en el plugin Login by Auth0 versiones anteriores a 4.0.0 para WordPress. Presenta numerosos campos que pueden contener datos que son extra\u00eddos de diferentes fuentes. Un problema con esto es que los datos no son saneados y no se realiza ninguna comprobaci\u00f3n de entrada, antes de la exportaci\u00f3n de los datos del usuario. Esto puede conllevar a (al menos) una inyecci\u00f3n de CSV si un documento Excel dise\u00f1ado es cargado."}], "id": "CVE-2020-7947", "lastModified": "2024-11-21T05:38:03.987", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-04-01T13:15:15.320", "references": [{"source": "cve@mitre.org", "tags": ["Product", "Vendor Advisory"], "url": "https://auth0.com/docs/cms/wordpress"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://auth0.com/docs/security/bulletins/2020-03-31_wpauth0"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/auth0/wp-auth0/security/advisories/GHSA-59vf-cgfw-6h6v"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://wordpress.org/plugins/auth0/#developers"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product", "Vendor Advisory"], "url": "https://auth0.com/docs/cms/wordpress"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://auth0.com/docs/security/bulletins/2020-03-31_wpauth0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/auth0/wp-auth0/security/advisories/GHSA-59vf-cgfw-6h6v"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://wordpress.org/plugins/auth0/#developers"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-1236"}], "source": "nvd@nist.gov", "type": "Primary"}]}