The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to an unsecure token check that is susceptible to type juggling in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to execute functions intended for use by users with proper API keys.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/contentstudio/trunk/contentstudio-plugin.php#L416 | Exploit Release Notes Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/c31828dc-ef94-4895-8395-a5d52a0a82bd?source=cve | Third Party Advisory |
Configurations
History
09 Jan 2024, 03:02
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/c31828dc-ef94-4895-8395-a5d52a0a82bd?source=cve - Third Party Advisory | |
CWE | NVD-CWE-noinfo |
07 Nov 2023, 04:00
Type | Values Removed | Values Added |
---|---|---|
CWE |
30 Oct 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2023-01-27 22:15
Updated : 2024-02-28 19:51
NVD link : CVE-2023-0558
Mitre link : CVE-2023-0558
CVE.ORG link : CVE-2023-0558
JSON object : View
Products Affected
contentstudio
- contentstudio
CWE