Sensitive Information Exposure in InfiniteWP Client Plugin for WordPress
CVE-2023-2916

7.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
15 August 2023

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The InfiniteWP Client plugin for WordPress has a vulnerability that allows authenticated attackers with subscriber-level permissions or above to access sensitive information, including site configuration details. This occurs through improper handling in the 'admin_notice' function, specifically in versions up to 1.11.1 of the plugin. The exploitation requires that the plugin has not been configured. If this vulnerability is exploited in conjunction with an unchecked arbitrary plugin installation, attackers could gain remote management capabilities and may elevate their privileges, posing significant risks to site integrity and security.

Affected Version(s)

InfiniteWP Client * <= 1.11.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lana Codes
.