CVE-2020-13700: acf-to-rest-api plugin insecure direct object reference (IDOR) via permalink manipulation
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99637%
CWE
Published
5/24/2022
Updated
11/15/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| airesvsg/acf-to-rest-api | composer | <= 3.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) The options controller directly uses user-supplied 'id' parameter to access wp_options entries without authorization checks (CWE-639). 2) The field processing function allows combining URL parameters to construct arbitrary option names (like 'mailserver_pass') through $_GET['id'] and $_GET['field'] manipulation (CWE-200). The plugin's REST endpoints expose raw option access without implementing WordPress capability checks or proper object reference validation, enabling direct database table enumeration through parameter manipulation as demonstrated in the exploit examples.