Lucene search

K
nvd[email protected]NVD:CVE-2023-3325
HistoryJun 20, 2023 - 5:15 a.m.

CVE-2023-3325

2023-06-2005:15:09
CWE-331
web.nvd.nist.gov
3
wordpress
cms commander
authorization bypass
cryptographic signature
privilege escalation

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.002

Percentile

57.0%

The CMS Commander plugin for WordPress is vulnerable to authorization bypass due to the use of an insufficiently unique cryptographic signature on the ‘cmsc_add_site’ function in versions up to, and including, 2.287. This makes it possible for unauthenticated attackers to the plugin to change the ‘_cmsc_public_key’ in the plugin config, providing access to the plugin’s remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation. This can only be exploited if the plugin has not been configured yet, however, if combined with another arbitrary plugin installation and activation vulnerability, the impact can be severe.

Affected configurations

Nvd
Node
cmscommandercms_commanderRange2.287wordpress
VendorProductVersionCPE
cmscommandercms_commander*cpe:2.3:a:cmscommander:cms_commander:*:*:*:*:*:wordpress:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.002

Percentile

57.0%

Related for NVD:CVE-2023-3325