Lucene search

K
cveWordfenceCVE-2023-3958
HistoryAug 16, 2023 - 5:15 a.m.

CVE-2023-3958

2023-08-1605:15:10
Wordfence
web.nvd.nist.gov
2463
wp remote users sync
wordpress
vulnerability
server side request forgery
cve-2023-3958
nvd

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0.002

Percentile

52.6%

The WP Remote Users Sync plugin for WordPress is vulnerable to Server Side Request Forgery via the ‘notify_ping_remote’ AJAX function in versions up to, and including, 1.2.12. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. This was partially patched in version 1.2.12 and fully patched in version 1.2.13.

Affected configurations

Nvd
Vulners
Node
frogerwp_remote_users_syncRange<1.2.13wordpress
VendorProductVersionCPE
frogerwp_remote_users_sync*cpe:2.3:a:froger:wp_remote_users_sync:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "frogerme",
    "product": "WP Remote Users Sync",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.12",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0.002

Percentile

52.6%

Related for CVE-2023-3958