Lucene search

K
cve[email protected]CVE-2023-2280
HistoryJun 09, 2023 - 6:16 a.m.

CVE-2023-2280

2023-06-0906:16:06
web.nvd.nist.gov
14
wp directory kit
wordpress
vulnerability
unauthorized modification
data loss
capability check
cve-2023-2280

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.8%

The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the ‘ajax_public’ function in versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0 and an additional partial patch was introduced in version 1.2.2, but the issue was not fully patched until 1.2.3.

Affected configurations

Vulners
NVD
Node
listingthemeswp_directory_kitRange1.2.2

CNA Affected

[
  {
    "vendor": "listingthemes",
    "product": "WP Directory Kit",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.8%

Related for CVE-2023-2280