CVE-2023-6506
WP 2FA <= 2.5.0 - Insecure Direct Object Reference to Arbitrary Email Sending
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.
El complemento WP 2FA – Two-factor authentication for WordPress para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta la 2.5.0 incluida a través de send_backup_codes_email debido a la falta de validación en una clave controlada por el usuario. Esto hace posible que los atacantes a nivel de suscriptor envíen correos electrónicos a usuarios arbitrarios en el sitio.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-12-04 CVE Reserved
- 2024-01-02 CVE Published
- 2024-01-17 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009922%40wp-2fa&new=3009922%40wp-2fa&sfp_email=&sfph_mail= | 2024-01-16 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wpwhitesecurity Search vendor "Wpwhitesecurity" | Wp 2fa Search vendor "Wpwhitesecurity" for product "Wp 2fa" | <= 2.5.0 Search vendor "Wpwhitesecurity" for product "Wp 2fa" and version " <= 2.5.0" | wordpress |
Affected
|