CVE-2023-2987
Wordapp <= 1.6.0 - Authorization Bypass through Use of Insufficiently Unique Cryptographic Signature
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.
El plugin Wordapp para WordPress es vulnerable a una omisión de autorización debido al uso de una firma criptográfica insuficientemente única en la función "wa_pdx_op_config_set" en versiones hasta la 1.5.0 inclusive. Esto hace posible que atacantes no autenticados al plugin cambien el "validation_token" en la configuración del plugin, proporcionando acceso a las funcionalidades de control remoto del plugin, como la creación de una URL de acceso de administrador, que puede ser utilizada para la esclada de privilegios.
The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-05-30 CVE Reserved
- 2023-05-30 CVE Published
- 2025-01-05 EPSS Updated
- 2025-01-13 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-345: Insufficient Verification of Data Authenticity
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9d?source=cve | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|