The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade johnbillion/wp-crontrol
to version 1.16.2 or higher.
johnbillion/wp-crontrol is a package that allows you to take control of the cron events on your WordPress website.
Affected versions of this package are vulnerable to Download of Code Without Integrity Check due to the feature that allows administrative users to create events in the WP-Cron system for storing and executing PHP code under specific security permissions. This feature, while not vulnerable on its own, could potentially be exploited for arbitrary code execution if combined with another vulnerability, such as SQL injection, that allows for the manipulation of the wp_options
table or the execution of arbitrary actions, filters, or functions with controlled parameters.
Note
This is only exploitable if the site is vulnerable to a writable SQL injection vulnerability in any plugin, theme, or WordPress core, the site's database is compromised at the hosting level, the site is vulnerable to a method of updating arbitrary options in the wp_options
table, or the site is vulnerable to a method of triggering an arbitrary action, filter, or function with control of the parameters.