{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T18:39:24.839","vulnerabilities":[{"cve":{"id":"CVE-2018-1000510","sourceIdentifier":"cve@mitre.org","published":"2018-06-26T16:29:00.853","lastModified":"2024-11-21T03:40:04.920","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WP Image Zoom version 1.23 contains a Incorrect Access Control vulnerability in AJAX settings that can result in allows anybody to cause denial of service. This attack appear to be exploitable via Can be triggered intentionally (or unintentionally via CSRF) by any logged in user. This vulnerability appears to have been fixed in 1.24."},{"lang":"es","value":"WP Image Zoom 1.23 contiene una vulnerabilidad de control de acceso incorrecto en las opciones de AJAX que puede resultar en que cualquiera pueda provocar una denegación de servicio (DoS). El ataque parece ser explotable mediante la realización intencional (o accidental mediante Cross-Site Request Forgery) por cualquier usuario que haya iniciado sesión. La vulnerabilidad parece haber sido solucionada en la versión 1.24."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:silkypress:image_zoom:1.23:*:*:*:*:wordpress:*:*","matchCriteriaId":"9AC8F285-753A-4379-8987-E3B3116CEBF8"}]}]}],"references":[{"url":"https://advisories.dxw.com/advisories/wp-image-zoom-dos/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://advisories.dxw.com/advisories/wp-image-zoom-dos/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}