{"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-07-04T08:17:24.618Z"},"title":"Change wp-admin Login < 1.1.0 - Unauthenticated Arbitrary Settings Update","problemTypes":[{"descriptions":[{"description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Change wp-admin login","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.1.0"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Change wp-admin login WordPress plugin before 1.1.0 does not properly check for authorisation and is also missing CSRF check when updating its settings, which could allow unauthenticated users to change the settings. The attacked could also be performed via a CSRF vector"}],"references":[{"url":"https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Daniel Ruf","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:10:03.626Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1589","datePublished":"2022-05-30T08:36:04.000Z","dateReserved":"2022-05-05T00:00:00.000Z","dateUpdated":"2024-08-03T00:10:03.626Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}