From fb817885db33389f8e2496972c4a374f96b4b34f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 9 Aug 2022 19:35:58 +0000 Subject: [PATCH] Auto Generated CVE annotations [Tue Aug 9 19:35:58 UTC 2022] :robot: --- cves/2020/CVE-2020-8772.yaml | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-8772.yaml b/cves/2020/CVE-2020-8772.yaml index bafc805ffa..b38d6792e9 100644 --- a/cves/2020/CVE-2020-8772.yaml +++ b/cves/2020/CVE-2020-8772.yaml @@ -11,9 +11,16 @@ info: reference: - https://wpscan.com/vulnerability/10011 - https://nvd.nist.gov/vuln/detail/CVE-2020-8772 + - https://www.webarxsecurity.com/vulnerability-infinitewp-client-wp-time-capsule/ + - https://wpvulndb.com/vulnerabilities/10011 remediation: Upgrade to InfiniteWP Client 1.9.4.5 or higher. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-8772 + cwe-id: CWE-862 metadata: - verified: true + verified: "true" tags: cve,cve2020,wordpress,wp-plugin,wp,infinitewp,auth-bypass requests: