Lucene search

K
nvd[email protected]NVD:CVE-2023-0958
HistoryJul 28, 2023 - 5:15 a.m.

CVE-2023-0958

2023-07-2805:15:09
web.nvd.nist.gov
4
wordpress
inisev
unauthorized installation
capability check
ajax action
authenticated attackers
subscribers
duplicate vulnerability

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

49.2%

Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability.

Affected configurations

Nvd
Node
backupblissbackup_migrationRange<1.2.8wordpress
OR
backupblisscloneRange<2.3.8wordpress
OR
copy-delete-postsduplicate_postRange<1.4.0wordpress
OR
inisevredirectionRange<1.1.4wordpress
OR
inisevrss_redirect_\&_feedburner_alternativeRange<3.8wordpress
OR
inisevssl_mixed_content_fixRange<3.2.4wordpress
OR
mypopupspop-upRange<1.2.0wordpress
OR
socialsharesocial_share_icons_\&_social_share_buttonsRange<3.5.8wordpress
OR
themecheckenhanced_text_widgetRange<1.5.8wordpress
OR
themecheckultimate_posts_widgetRange<2.2.5wordpress
OR
ultimatelysocialsocial_media_share_buttons_\&_social_sharing_iconsRange<2.8.2wordpress
VendorProductVersionCPE
backupblissbackup_migration*cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*
backupblissclone*cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*
copy-delete-postsduplicate_post*cpe:2.3:a:copy-delete-posts:duplicate_post:*:*:*:*:*:wordpress:*:*
inisevredirection*cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*
inisevrss_redirect_\&_feedburner_alternative*cpe:2.3:a:inisev:rss_redirect_\&_feedburner_alternative:*:*:*:*:*:wordpress:*:*
inisevssl_mixed_content_fix*cpe:2.3:a:inisev:ssl_mixed_content_fix:*:*:*:*:*:wordpress:*:*
mypopupspop-up*cpe:2.3:a:mypopups:pop-up:*:*:*:*:*:wordpress:*:*
socialsharesocial_share_icons_\&_social_share_buttons*cpe:2.3:a:socialshare:social_share_icons_\&_social_share_buttons:*:*:*:*:*:wordpress:*:*
themecheckenhanced_text_widget*cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*
themecheckultimate_posts_widget*cpe:2.3:a:themecheck:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*
Rows per page:
1-10 of 111

References

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

49.2%