// For flags

CVE-2023-5882

WP All Export (Free < 1.4.1, Pro < 1.8.6) - Remote Code Execution via CSRF

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers to make logged in users perform unwanted actions leading to remote code execution.

El complemento Export any WordPress data to XML/CSV de WordPress anterior a 1.4.0, el complemento WP All Export Pro de WordPress anterior a 1.8.6 no verifica los tokens nonce lo suficientemente temprano en el ciclo de vida de la solicitud, lo que permite a los atacantes hacer que los usuarios que han iniciado sesión realicen acciones no deseadas que conducen a ejecución remota de código.

The Export any WordPress data to XML/CSV plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 1.4.1, and in versions up to 1.8.6 in the PRO version. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to perform unauthorized actions and achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

*Credits: Francesco Marano (@mrnfrancesco), Donato Di Pasquale (@ddipa), WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-31 CVE Reserved
  • 2023-11-24 CVE Published
  • 2023-12-22 EPSS Updated
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Soflyy
Search vendor "Soflyy"
Export Any Wordpress Data To Xml\/csv
Search vendor "Soflyy" for product "Export Any Wordpress Data To Xml\/csv"
< 1.4.1
Search vendor "Soflyy" for product "Export Any Wordpress Data To Xml\/csv" and version " < 1.4.1"
wordpress
Affected
Soflyy
Search vendor "Soflyy"
Wp All Export
Search vendor "Soflyy" for product "Wp All Export"
< 1.8.6
Search vendor "Soflyy" for product "Wp All Export" and version " < 1.8.6"
pro, wordpress
Affected