Data Modification Vulnerabilities in WP Directory Kit Plugin by WordPress
CVE-2023-2280
5.3MEDIUM
Summary
The WP Directory Kit plugin for WordPress is susceptible to unauthorized data modification stemming from a missing capability check in its 'ajax_public' function. This vulnerability affects versions up to 1.2.2, enabling unauthenticated attackers to manipulate plugin settings, import demo data, and delete associated posts and terms. Moreover, it allows the installation of arbitrary plugins, posing a significant security risk. Although partial patches were introduced in versions 1.2.0 and 1.2.2, the vulnerability was not fully resolved until the release of version 1.2.3.
Affected Version(s)
WP Directory Kit * <= 1.2.2
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ramuel Gall
Lana Codes