Lucene search

K
cveWordfenceCVE-2023-2027
HistoryApr 15, 2023 - 8:15 a.m.

CVE-2023-2027

2023-04-1508:15:07
CWE-287
Wordfence
web.nvd.nist.gov
29
wordpress
zm ajax
authentication bypass
cve-2023-2027
nvd

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.003

Percentile

68.6%

The ZM Ajax Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.2. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Affected configurations

Nvd
Vulners
Node
zm_ajax_login_\&_register_projectzm_ajax_login_\&_registerRange2.0.2wordpress
VendorProductVersionCPE
zm_ajax_login_\&_register_projectzm_ajax_login_\&_register*cpe:2.3:a:zm_ajax_login_\&_register_project:zm_ajax_login_\&_register:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "zanematthew",
    "product": "ZM Ajax Login & Register",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2.0.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.003

Percentile

68.6%

Related for CVE-2023-2027