CVE-2020-7947
WordPress vulnerability analysis and mitigation

Overview

CVE-2020-7947 is a CSV injection vulnerability identified in the WordPress Plugin for Auth0 versions 3.11.3 and earlier. The vulnerability was discovered and reported by Muhamad Visat, with public disclosure on April 1, 2020 (Auth0 Security, GitHub Advisory).

Technical details

The vulnerability was rated with a CVSS score of 9.8, indicating a critical severity level. This CSV injection vulnerability affected the Auth0 WordPress plugin's data handling mechanisms (Wordfence Intel).

Impact

The CSV injection vulnerability could potentially allow attackers to manipulate data exports and potentially execute malicious code through CSV file manipulation (Auth0 Security).

Mitigation and workarounds

The vulnerability was addressed in version 4.0.0 of the WordPress Plugin for Auth0. Users were advised to upgrade to this version or later to protect against the vulnerability (Auth0 Security).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14001MEDIUM5.4
  • wp-duplicate-page
NoYesJan 13, 2026
CVE-2025-14579MEDIUM4.8
  • quiz-maker
NoYesJan 12, 2026
CVE-2025-13393MEDIUM4.3
  • featured-image-from-url
NoYesJan 10, 2026
CVE-2025-14829N/AN/A
  • e-xact-hosted-payment
NoNoJan 13, 2026
CVE-2025-10915N/AN/A
  • dreamer-blog
NoNoJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management