Lucene search

K
nvd[email protected]NVD:CVE-2023-6506
HistoryJan 11, 2024 - 7:15 a.m.

CVE-2023-6506

2024-01-1107:15:08
CWE-732
web.nvd.nist.gov
3
cve-2023-6506
insecure direct object reference
wordpress
2fa
vulnerable plugin
user controlled key
subscriber-level attackers

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.6

Confidence

High

EPSS

0.001

Percentile

21.1%

The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.

Affected configurations

Nvd
Node
wpwhitesecuritywp_2faRange2.5.0wordpress
VendorProductVersionCPE
wpwhitesecuritywp_2fa*cpe:2.3:a:wpwhitesecurity:wp_2fa:*:*:*:*:*:wordpress:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.6

Confidence

High

EPSS

0.001

Percentile

21.1%

Related for NVD:CVE-2023-6506