Cross-Site Request Forgery in Feather Login Page Plugin for WordPress
CVE-2023-2549

8.8HIGH

What is CVE-2023-2549?

The Feather Login Page plugin for WordPress contains a Cross-Site Request Forgery vulnerability due to inadequate nonce validation in the 'createTempAccountLink' function. This flaw allows unauthorized individuals to exploit the plugin by tricking site administrators into submitting forged requests. As a result, an attacker could create a new user with administrative privileges, potentially compromising the entire site. Attackers may also use related vulnerabilities to obtain login links or initiate password reset requests to the newly created user’s email.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Custom Login Page | Temporary Users | Rebrand Login | Login Captcha 1.0.7 <= 1.1.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lana Codes
.