Unauthorized Data Loss Risk in Feather Login Page Plugin for WordPress
CVE-2023-2547

5.4MEDIUM

What is CVE-2023-2547?

The Feather Login Page plugin for WordPress suffers from a critical authorization bypass vulnerability. Due to the absence of a proper capability check on the 'deleteUser' function, authenticated attackers with subscriber-level permissions can exploit this flaw, allowing them to delete temporary users generated by the plugin. This exposes the affected system to potential unauthorized data loss, undermining user management and data integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Custom Login Page | Temporary Users | Rebrand Login | Login Captcha 1.0.7 <= 1.1.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lana Codes
.