tagDiv Cloud Library < 2.7 - Unauthenticated Arbitrary User Metadata Update to Privilege Escalation
CVE-2023-1597

8.8HIGH

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
10 July 2023

What is CVE-2023-1597?

The tagDiv Cloud Library plugin for WordPress, prior to version 2.7, lacks necessary authorization checks and is susceptible to Cross-Site Request Forgery (CSRF). This vulnerability allows both unauthenticated and authenticated users to access an AJAX action, enabling unauthorized alteration of user metadata. As a consequence, an attacker could exploit this flaw to escalate privileges, potentially granting themselves administrative rights to the blog.

Affected Version(s)

tagDiv Cloud Library 0 < 2.7

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Truoc Phan
WPScan
.