Lucene search

K
cve[email protected]CVE-2023-0556
HistoryJan 27, 2023 - 10:15 p.m.

CVE-2023-0556

2023-01-2722:15:09
web.nvd.nist.gov
27
contentstudio
wordpress
vulnerability
authorization bypass
capability check
unauthenticated attackers
blog metadata
cstu_get_metadata
contentstudio_token

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.5%

The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to obtain the blog metadata (via the function cstu_get_metadata) that includes the plugin’s contentstudio_token. Knowing this token allows for other interactions with the plugin such as creating posts in versions prior to 1.2.5, which added other requirements to posting and updating.

Affected configurations

Vulners
NVD
Node
contentstudiocontentstudioRange1.2.5
VendorProductVersionCPE
contentstudiocontentstudio*cpe:2.3:a:contentstudio:contentstudio:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contentstudio",
    "product": "ContentStudio",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.5",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.5%

Related for CVE-2023-0556