Lucene search

K
cve[email protected]CVE-2023-6036
HistoryFeb 12, 2024 - 4:15 p.m.

CVE-2023-6036

2024-02-1216:15:07
web.nvd.nist.gov
59
web3
wordpress
plugin
authentication bypass
cve-2023-6036
nvd

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions ‘handle_auth_request’ and ‘hadle_login_request’. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Affected configurations

Vulners
Node
uniswapweb3-react_eip1193Range<3.0.0
VendorProductVersionCPE
uniswapweb3\-react_eip1193*cpe:2.3:a:uniswap:web3\-react_eip1193:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Web3",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "3.0.0"
      }
    ],
    "defaultStatus": "unaffected",
    "collectionURL": "https://wordpress.org/plugins"
  }
]

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%