U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2020-36708

Change History

Initial Analysis by NIST 6/16/2023 11:21:58 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:colorlib:activello:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.4.2
     *cpe:2.3:a:colorlib:bonkers:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.0.6
     *cpe:2.3:a:colorlib:illdy:*:*:*:*:*:wordpress:*:* versions up to (excluding) 2.1.7
     *cpe:2.3:a:colorlib:newspaper_x:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.3.2
     *cpe:2.3:a:colorlib:pixova_lite:*:*:*:*:*:wordpress:*:* versions up to (excluding) 2.0.7
     *cpe:2.3:a:colorlib:shapely:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.2.9
     *cpe:2.3:a:colorlib:sparklinkg:*:*:*:*:*:wordpress:*:* versions up to (including) 2.4.8
     *cpe:2.3:a:cpothemes:affluent:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.1.2
     *cpe:2.3:a:cpothemes:allegiant:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.2.6
     *cpe:2.3:a:cpothemes:brilliance:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.3.0
     *cpe:2.3:a:cpothemes:transcend:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.2.0
     *cpe:2.3:a:machothemes:antreas:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.0.7
     *cpe:2.3:a:machothemes:medzone_lite:*:*:*:*:*:wordpress:*:* versions up to (excluding) 1.2.6
     *cpe:2.3:a:machothemes:naturemag_lite:*:*:*:*:*:wordpress:*:* versions up to (including) 1.0.4
     *cpe:2.3:a:machothemes:newsmag:*:*:*:*:*:wordpress:*:* versions up to (excluding) 2.4.2
     *cpe:2.3:a:machothemes:regina_lite:*:*:*:*:*:wordpress:*:* versions up to (excluding) 2.0.6
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-94
Changed Reference Type
https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-fixed-in-15-wordpress-themes/ No Types Assigned
https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-fixed-in-15-wordpress-themes/ Exploit, Third Party Advisory
Changed Reference Type
https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-in-wordpress-sparkling-theme/ No Types Assigned
https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-in-wordpress-sparkling-theme/ Exploit, Third Party Advisory
Changed Reference Type
https://wpscan.com/vulnerability/bec52a5b-c892-4763-a962-05da7100eca5 No Types Assigned
https://wpscan.com/vulnerability/bec52a5b-c892-4763-a962-05da7100eca5 Third Party Advisory
Changed Reference Type
https://www.wordfence.com/blog/2020/11/large-scale-attacks-target-epsilon-framework-themes/ No Types Assigned
https://www.wordfence.com/blog/2020/11/large-scale-attacks-target-epsilon-framework-themes/ Third Party Advisory
Changed Reference Type
https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=cve No Types Assigned
https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=cve Third Party Advisory