CVE-2023-2437
UserPro <= 5.1.1 - Authentication Bypass to Administrator
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The UserPro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.1. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. An attacker can leverage CVE-2023-2448 and CVE-2023-2446 to get the user's email address to successfully exploit this vulnerability.
El complemento UserPro para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 5.1.1 incluida. Esto se debe a una verificación insuficiente del usuario que se proporciona durante el inicio de sesión de Facebook a través del complemento. Esto hace posible que atacantes no autenticados inicien sesión como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electrónico. Un atacante puede aprovechar CVE-2023-2448 y CVE-2023-2446 para obtener la dirección de correo electrónico del usuario y aprovechar esta vulnerabilidad con éxito.
WordPress UserPro plugin versions 5.1.1 and below suffer from an insecure password reset mechanism, information disclosure, and authentication bypass vulnerabilities. Versions 5.1.4 and below suffer from privilege escalation and shortcode execution vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-05-01 CVE Reserved
- 2023-11-21 CVE Published
- 2024-03-02 First Exploit
- 2024-08-02 CVE Updated
- 2024-11-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-287: Improper Authentication
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 | Product | |
https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=cve | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/RxRCoder/CVE-2023-2437 | 2024-03-02 | |
http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Userproplugin Search vendor "Userproplugin" | Userpro Search vendor "Userproplugin" for product "Userpro" | <= 5.1.1 Search vendor "Userproplugin" for product "Userpro" and version " <= 5.1.1" | wordpress |
Affected
|