// For flags

CVE-2023-35039

WordPress Password Reset with Code for WordPress REST API Plugin <= 0.0.15 is vulnerable to Broken Authentication

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.

La vulnerabilidad de restricción inadecuada de intentos de autenticación excesivos en Be Devious Web Development Password Reset with Code para la API REST de WordPress permite el abuso de autenticación. Este problema afecta el restablecimiento de contraseña con código para la API REST de WordPress: desde n/a hasta 0.0.15.

The Password Reset with Code for WordPress REST API is vulnerable to a Weak Password Recovery Mechanism in versions up to, and including, 0.0.15. This allows unauthenticated attackers to set a 4-digit password recovery code for arbitrary users that, if guessed correctly, will allow them to reset the password for that user. Although each code is only allowed 3 tries by default, there is no restriction on the number of code generation attempts allowed, effectively reducing the entropy of the password reset mechanism to 4 digits. Additionally the code generation mechanism uses str_shuffle which does not use a cryptographically secure PNRG.

*Credits: Jonas Höbenreich (Patchstack Alliance)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-06-12 CVE Reserved
  • 2023-08-14 CVE Published
  • 2024-08-02 CVE Updated
  • 2025-01-08 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-307: Improper Restriction of Excessive Authentication Attempts
  • CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CAPEC
  • CAPEC-114: Authentication Abuse
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bedevious
Search vendor "Bedevious"
Password Reset With Code For Wordpress Rest Api
Search vendor "Bedevious" for product "Password Reset With Code For Wordpress Rest Api"
< 0.0.16
Search vendor "Bedevious" for product "Password Reset With Code For Wordpress Rest Api" and version " < 0.0.16"
wordpress
Affected