The RegistrationMagic plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 5.2.0.5. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers, with administrator-level permissions and above, to change user passwords and potentially take over super-administrator accounts in multisite setup.
References
Configurations
History
21 Nov 2024, 07:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.6 |
References | () https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/5.2.0.5/includes/class_rm_utilities.php#L3044 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bfbc406b-49af-419e-adeb-0510794b7e3f?source=cve - Third Party Advisory |
Information
Published : 2023-05-16 09:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2548
Mitre link : CVE-2023-2548
CVE.ORG link : CVE-2023-2548
JSON object : View
Products Affected
metagauss
- registrationmagic
CWE
CWE-639
Authorization Bypass Through User-Controlled Key