Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-36748

The Dokan plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.0.8. This is due to missing or incorrect nonce validation on the handle_order_export() function. This makes it possible for unauthenticated attackers to trigger an order export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 31.8%
CVSS Severity
CVSS v3 Score 4.3
References
Products affected by CVE-2020-36748
  • Wedevs » Dokan » Version: N/A
    cpe:2.3:a:wedevs:dokan:-
  • Wedevs » Dokan » Version: 2.5.7
    cpe:2.3:a:wedevs:dokan:2.5.7
  • Wedevs » Dokan » Version: 2.6.10
    cpe:2.3:a:wedevs:dokan:2.6.10
  • Wedevs » Dokan » Version: 2.7.8
    cpe:2.3:a:wedevs:dokan:2.7.8
  • Wedevs » Dokan » Version: 2.8.6
    cpe:2.3:a:wedevs:dokan:2.8.6
  • Wedevs » Dokan » Version: 2.9.31
    cpe:2.3:a:wedevs:dokan:2.9.31
  • Wedevs » Dokan » Version: 3.0.0
    cpe:2.3:a:wedevs:dokan:3.0.0
  • Wedevs » Dokan » Version: 3.0.1
    cpe:2.3:a:wedevs:dokan:3.0.1
  • Wedevs » Dokan » Version: 3.0.2
    cpe:2.3:a:wedevs:dokan:3.0.2
  • Wedevs » Dokan » Version: 3.0.3
    cpe:2.3:a:wedevs:dokan:3.0.3
  • Wedevs » Dokan » Version: 3.0.4
    cpe:2.3:a:wedevs:dokan:3.0.4
  • Wedevs » Dokan » Version: 3.0.5
    cpe:2.3:a:wedevs:dokan:3.0.5
  • Wedevs » Dokan » Version: 3.0.6
    cpe:2.3:a:wedevs:dokan:3.0.6
  • Wedevs » Dokan » Version: 3.0.7
    cpe:2.3:a:wedevs:dokan:3.0.7
  • Wedevs » Dokan » Version: 3.0.8
    cpe:2.3:a:wedevs:dokan:3.0.8


Contact Us

Shodan ® - All rights reserved