Lucene search

K
cveWordfenceCVE-2023-2351
HistoryJun 13, 2023 - 2:15 a.m.

CVE-2023-2351

2023-06-1302:15:09
Wordfence
web.nvd.nist.gov
19
cve-2023-2351
wordpress
directory kit
data modification
unauthorized
vulnerability
nvd
security issue

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

45.5%

The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the ‘ajax_admin’ function in versions up to, and including, 1.2.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0.

Affected configurations

Nvd
Vulners
Node
wpdirectorykitwp_directory_kitRange<1.2.4wordpress
VendorProductVersionCPE
wpdirectorykitwp_directory_kit*cpe:2.3:a:wpdirectorykit:wp_directory_kit:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "listingthemes",
    "product": "WP Directory Kit",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

References

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

45.5%

Related for CVE-2023-2351