Lucene search

K
vulnrichmentWordfenceVULNRICHMENT:CVE-2023-7065
HistoryMay 04, 2024 - 7:36 a.m.

CVE-2023-7065

2024-05-0407:36:21
Wordfence
github.com
1
wordpress
cross-site request forgery
security vulnerability
nonce validation
spammers security plugin

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

6.6 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.0%

The Stop Spammers Security | Block Spam Users, Comments, Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2024.4. This is due to missing or incorrect nonce validation on the sfs_process AJAX action. This makes it possible for unauthenticated attackers to add arbitrary IPs to the plugin’s allowlist and blocklist via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CNA Affected

[
  {
    "vendor": "mcitar",
    "product": "Anti-Spam: Spam Protection | Block Spam Users, Comments, Forms",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2024.4",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

6.6 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.0%

Related for VULNRICHMENT:CVE-2023-7065