Lucene search

K
cveWPScanCVE-2023-6036
HistoryFeb 12, 2024 - 4:15 p.m.

CVE-2023-6036

2024-02-1216:15:07
WPScan
web.nvd.nist.gov
62
web3
wordpress
plugin
authentication bypass
cve-2023-6036
nvd

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

9.0%

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions ‘handle_auth_request’ and ‘hadle_login_request’. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Affected configurations

Vulners
Node
web3Range<3.0.0wordpress
VendorProductVersionCPE
*web3*cpe:2.3:a:*:web3:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Web3",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "3.0.0"
      }
    ],
    "defaultStatus": "unaffected",
    "collectionURL": "https://wordpress.org/plugins"
  }
]

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

9.0%