CVE-2021-4362
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The Kiwi Social Share plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the kiwi_social_share_get_option() function called via the kiwi_social_share_get_option AJAX action in version 2.1.0. This makes it possible for unauthenticated attackers to read and modify arbitrary options on a WordPress site that can be used for complete site takeover. This was a previously fixed vulnerability that was reintroduced in this version.
| Vendor | wpkube |
| Product | social sharing plugin – kiwi |
| Published | Jun 7, 2023 |
| Last Updated | Dec 28, 2024 |
Stay Ahead of the Next One
Get instant alerts for wpkube social sharing plugin – kiwi
Be the first to know when new critical vulnerabilities affecting wpkube social sharing plugin – kiwi are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
wpkube / Social Sharing Plugin – Kiwi
2.1.0 ≤ 2.1.2
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/8148b6d0-190a-4b97-8af7-edd6943116d1?source=cve blog.nintechnet.com: https://blog.nintechnet.com/wordpress-kiwi-social-sharing-plugin-fixed-critical-vulnerability/ wordpress.org: https://wordpress.org/plugins/kiwi-social-share/#developers
Credits
Jerome Bruandet