CVE-2020-15251

Summary

CVECVE-2020-15251
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2020-10-13 18:15:00 UTC
Updated2021-11-18 16:58:00 UTC
DescriptionIn the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.

Risk And Classification

Problem Types: CWE-862

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Miraheze Channelmgnt All All All All
Application Miraheze Channelmgnt All All All All
Application Mirahezebots Channelmgnt All All All All

References

ReferenceSourceLinkTags
sopel-plugins.channelmgnt · PyPI MISC pypi.org Release Notes, Third Party Advisory
[SECURITY] Actually fix by RhinosF1 · Pull Request #3 · MirahezeBots/sopel-channelmgnt · GitHub MISC github.com Patch, Third Party Advisory
⚓ T117 [CVE-2020-15251] makemodechange failed to check access on restricted changes for self actions allowing ACL bypass {Version 9.0.0 - 9.0.2} MISC phab.bots.miraheze.wiki Issue Tracking, Patch, Vendor Advisory
Privilege Escalation issue in makemodechange self action logic · Advisory · MirahezeBots/MirahezeBots · GitHub MISC github.com Vendor Advisory
✩ Summary MISC phab.bots.miraheze.wiki Vendor Advisory
Privilege Escalation issue in makemodechange self action logic · Advisory · MirahezeBots/sopel-channelmgnt · GitHub CONFIRM github.com Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 980063 Python (pip) Security Update for sopel_plugins.channelmgnt (GHSA-j257-jfvv-h3x5)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report