Authentication Bypass in CRUDLab WP Like Button Plugin for WordPress
CVE-2019-13344
5.3MEDIUM
Summary
An authentication bypass flaw exists in the CRUDLab WP Like Button plugin for WordPress that affects versions up to 1.6.0. This vulnerability allows unauthorized users to alter settings without proper authentication. The issue arises from the contains() function in wp_like_button.php, which fails to verify if the user making the request is authenticated. As a result, unauthenticated attackers can manipulate settings by sending requests to specific URLs, such as wp-admin/admin.php?page=facebook-like-button, thus compromising the integrity of the plugin.
References
EPSS Score
19% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved