Lucene search

K
cvelistWordfenceCVELIST:CVE-2023-2261
HistoryJun 09, 2023 - 12:32 p.m.

CVE-2023-2261

2023-06-0912:32:01
Wordfence
www.cve.org
4
wordpress
plugin
authorization bypass
vulnerability
version 4.5.0
authenticated attackers
subscriber
user list
ids
usernames
emails

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.6

Confidence

High

EPSS

0.001

Percentile

34.8%

The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscriber-level access or higher, to obtain a list of users with accounts on the site. This includes ids, usernames and emails.

CNA Affected

[
  {
    "vendor": "wpwhitesecurity",
    "product": "WP Activity Log",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "4.5.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "wpwhitesecurity",
    "product": "WP Activity Log Premium",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "4.5.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.6

Confidence

High

EPSS

0.001

Percentile

34.8%

Related for CVELIST:CVE-2023-2261