CVE-2020-15140: Remote Code Execution in Red Discord Bot
8.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.51174%
CWE
Published
8/21/2020
Updated
10/25/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Red-DiscordBot | pip | < 3.3.11 | 3.3.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The critical fix in commit 9ab5362 shows removal of a .format()
call that processed user-controlled member data. As usernames are external input, using .format()
on them without proper sanitization creates a format string vulnerability (CWE-74). The patch removed this insecure string formatting, confirming this was the injection vector. The function's role in leaderboard generation matches the vulnerability description of username-based code injection.