CVE-2023-2548

The RegistrationMagic plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 5.2.0.5. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers, with administrator-level permissions and above, to change user passwords and potentially take over super-administrator accounts in multisite setup.
Configurations

Configuration 1 (hide)

cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 6.6
References () https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/5.2.0.5/includes/class_rm_utilities.php#L3044 - Patch () https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/5.2.0.5/includes/class_rm_utilities.php#L3044 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/bfbc406b-49af-419e-adeb-0510794b7e3f?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/bfbc406b-49af-419e-adeb-0510794b7e3f?source=cve - Third Party Advisory

Information

Published : 2023-05-16 09:15

Updated : 2024-11-21 07:58


NVD link : CVE-2023-2548

Mitre link : CVE-2023-2548

CVE.ORG link : CVE-2023-2548


JSON object : View

Products Affected

metagauss

  • registrationmagic
CWE
CWE-639

Authorization Bypass Through User-Controlled Key