Authentication Bypass in CRUDLab WP Like Button Plugin for WordPress
CVE-2019-13344

5.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
5 July 2019

Summary

An authentication bypass flaw exists in the CRUDLab WP Like Button plugin for WordPress that affects versions up to 1.6.0. This vulnerability allows unauthorized users to alter settings without proper authentication. The issue arises from the contains() function in wp_like_button.php, which fails to verify if the user making the request is authenticated. As a result, unauthenticated attackers can manipulate settings by sending requests to specific URLs, such as wp-admin/admin.php?page=facebook-like-button, thus compromising the integrity of the plugin.

References

EPSS Score

19% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.