{"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-07-04T08:06:44.318Z"},"title":"Sitemap by click5 < 1.0.36 - Unauthenticated Arbitrary Options Update","problemTypes":[{"descriptions":[{"description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Sitemap by click5","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.0.36"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Sitemap by click5 WordPress plugin before 1.0.36 does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin. As a result, unauthenticated attackers could change arbitrary blog options, such as the users_can_register and default_role, allowing them to create a new admin account and take over the blog."}],"references":[{"url":"https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"cydave","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:43.044Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-0952","datePublished":"2022-05-02T16:05:46.000Z","dateReserved":"2022-03-14T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:43.044Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}