CVE-2023-5054

The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:superstorefinder:super_store_finder:*:*:*:*:*:wordpress:*:*

History

07 Nov 2023, 04:23

Type Values Removed Values Added
CWE CWE-862

03 Nov 2023, 19:13

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.8
v2 : unknown
v3 : 5.3
References (MISC) https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ - (MISC) https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ - Release Notes

13 Oct 2023, 01:15

Type Values Removed Values Added
Summary The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.2. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer. The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer.
References
  • (MISC) https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ -

21 Sep 2023, 18:41

Type Values Removed Values Added
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve - Third Party Advisory
References (MISC) https://superstorefinder.net/ - (MISC) https://superstorefinder.net/ - Product
CPE cpe:2.3:a:superstorefinder:super_store_finder:*:*:*:*:*:wordpress:*:*
First Time Superstorefinder super Store Finder
Superstorefinder

19 Sep 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-19 07:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-5054

Mitre link : CVE-2023-5054

CVE.ORG link : CVE-2023-5054


JSON object : View

Products Affected

superstorefinder

  • super_store_finder
CWE

No CWE.