Unauthorized Data Loss Risk in Feather Login Page Plugin for WordPress
CVE-2023-2547

5.4MEDIUM

What is CVE-2023-2547?

The Feather Login Page plugin for WordPress suffers from a critical authorization bypass vulnerability. Due to the absence of a proper capability check on the 'deleteUser' function, authenticated attackers with subscriber-level permissions can exploit this flaw, allowing them to delete temporary users generated by the plugin. This exposes the affected system to potential unauthorized data loss, undermining user management and data integrity.

Affected Version(s)

Custom Login Page | Temporary Users | Rebrand Login | Login Captcha 1.0.7 <= 1.1.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lana Codes
.