CVE-2023-46212
WordPress WP EXtra Plugin <= 6.2 is vulnerable to Broken Access Control
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in TienCOP WP EXtra allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects WP EXtra: from n/a through 6.2.
AutorizaciĆ³n faltante, vulnerabilidad de Cross-Site Request Forgery (CSRF) en TienCOP WP EXtra permite acceder a la funcionalidad no restringida adecuadamente por las ACL, Cross-Site Request Forgery. Este problema afecta a WP EXtra: desde n/a hasta 6.2.
The WP EXtra plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to export plugin settings.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-10-18 CVE Reserved
- 2023-10-19 CVE Published
- 2024-08-02 CVE Updated
- 2024-12-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-862: Missing Authorization
CAPEC
- CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
- CAPEC-62: Cross Site Request Forgery
References (1)
URL | Tag | Source |
---|---|---|
https://patchstack.com/database/vulnerability/wp-extra/wordpress-wp-extra-plugin-6-2-broken-access-control-vulnerability?_s_id=cve | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|