The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer.
References
Configurations
History
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://superstorefinder.net/ - Product | |
References | () https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ - Release Notes | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.8 |
07 Nov 2023, 04:23
Type | Values Removed | Values Added |
---|---|---|
CWE |
03 Nov 2023, 19:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | (MISC) https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/ - Release Notes |
13 Oct 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer. | |
References |
|
21 Sep 2023, 18:41
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve - Third Party Advisory | |
References | (MISC) https://superstorefinder.net/ - Product | |
First Time |
Superstorefinder super Store Finder
Superstorefinder |
|
CPE | cpe:2.3:a:superstorefinder:super_store_finder:*:*:*:*:*:wordpress:*:* |
19 Sep 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-19 07:15
Updated : 2024-11-21 08:40
NVD link : CVE-2023-5054
Mitre link : CVE-2023-5054
CVE.ORG link : CVE-2023-5054
JSON object : View
Products Affected
superstorefinder
- super_store_finder
CWE
No CWE.