Data Modification Vulnerabilities in WP Directory Kit Plugin by WordPress
CVE-2023-2280

5.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
9 June 2023

Summary

The WP Directory Kit plugin for WordPress is susceptible to unauthorized data modification stemming from a missing capability check in its 'ajax_public' function. This vulnerability affects versions up to 1.2.2, enabling unauthenticated attackers to manipulate plugin settings, import demo data, and delete associated posts and terms. Moreover, it allows the installation of arbitrary plugins, posing a significant security risk. Although partial patches were introduced in versions 1.2.0 and 1.2.2, the vulnerability was not fully resolved until the release of version 1.2.3.

Affected Version(s)

WP Directory Kit * <= 1.2.2

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ramuel Gall
Lana Codes
.