WordPress Password Reset with Code for WordPress REST API Plugin <= 0.0.15 is vulnerable to Broken Authentication
CVE-2023-35039
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 7 December 2023
Summary
The Be Devious Web Development Password Reset with Code for WordPress REST API contains a flaw that allows for improper restriction of excessive authentication attempts. This vulnerability enables attackers to exploit the password reset functionality, potentially leading to unauthorized access through brute force techniques. The issue is present in versions up to and including 0.0.15, highlighting the importance of mitigating authentication abuses that compromise the integrity of user accounts.
Affected Version(s)
Password Reset with Code for WordPress REST API <= 0.0.15
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jonas Höbenreich (Patchstack Alliance)