Lucene search

K
nvd[email protected]NVD:CVE-2023-6600
HistoryJan 03, 2024 - 6:15 a.m.

CVE-2023-6600

2024-01-0306:15:47
CWE-79
web.nvd.nist.gov
wordpress
plugin vulnerability
cross-site scripting
data modification
capability check
version 5.7.9
patched.

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.8%

The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin’s settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.

Affected configurations

NVD
Node
daanomgfRange<5.7.10wordpress

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.8%

Related for NVD:CVE-2023-6600