Lucene search

K
cve[email protected]CVE-2023-6777
HistoryApr 09, 2024 - 7:15 p.m.

CVE-2023-6777

2024-04-0919:15:12
web.nvd.nist.gov
42
cve-2023-6777
nvd
organization

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

9.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 9.0.34 due to the plugin adding the API key to several plugin files. This makes it possible for unauthenticated attackers to obtain the developer’s Google API key. While this does not affect the security of sites using this plugin, it allows unauthenticated attackers to make requests using this API key with the potential of exhausting requests resulting in an inability to use the map functionality offered by the plugin.

Affected configurations

Vulners
Node
wpgmapswp_go_mapsRange9.0.34
VendorProductVersionCPE
wpgmapswp_go_maps*cpe:2.3:a:wpgmaps:wp_go_maps:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "wpgmaps",
    "product": "WP Go Maps (formerly WP Google Maps)",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "9.0.34",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

9.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-6777