Open mend-app-sh[bot] opened 8 months ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
Vulnerable Library - wpmenumaker1.1.2
Library home page: https://plugins.svn.wordpress.org/wpmenumaker
Found in HEAD commit: 8204b1d9925336903f055f899061b45d3f6ae447
Vulnerable Source Files (1)
/simple_app/jquery.ba-bbq.js
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-20086
### Vulnerable Library - wpmenumaker1.1.2Library home page: https://plugins.svn.wordpress.org/wpmenumaker
Found in HEAD commit: 8204b1d9925336903f055f899061b45d3f6ae447
Found in base branch: main
### Vulnerable Source Files (1)/simple_app/jquery.ba-bbq.js
### Vulnerability DetailsImproperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
Publish Date: 2021-04-23
URL: CVE-2021-20086
### CVSS 3 Score Details (8.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.