The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘profile_magic_check_smtp_connection’ function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation..This CVE has a CVSS3.1 score of 8.8 and a Base Severity of HIGH.
Info | Details |
---|---|
CVE ID | CVE-2023-3713 |
CVE State | PUBLISHED |
BaseScore | 8.8 |
BaseSeverity | HIGH |
VectorString | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Version | NA |
References for CVE-2023-3713 :
https://www.wordfence.com/threat-intel/vulnerabilities/id/473ba791-af99-4aae-99cb-ccf220e443e7?source=cve
https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.4.8/admin/class-profile-magic-admin.php#L599
https://plugins.trac.wordpress.org/changeset/2938904/profilegrid-user-profiles-groups-and-communities#file0
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NA |
AttackComplexity(AC) | NA |
PrivilegesRequired(PR) | NA |
UserInteraction(UI) | NA |
Scope(S) | NA |
Confidentiality(C) | NA |
Availability(A) | NA |
Integrity(I) | NA |