Seraphinite Accelerator < 2.20.32 - Unauthorised Settings Reset/Import
CVE-2023-5611 
5.3MEDIUM
Key Information:
- Vendor
 Wordpress
- Status
 - Vendor
 - CVE Published:
 - 27 November 2023
 
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2023-5611?
The Seraphinite Accelerator WordPress plugin before 2.20.32 does not have authorisation and CSRF checks when resetting and importing its settings, allowing unauthenticated users to reset them
Affected Version(s)
Seraphinite Accelerator 0 < 2.20.32
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
 Low
Availability:
 None
Attack Vector:
Network
Attack Complexity:
 Low
Privileges Required:
 None
User Interaction:
 None
Scope:
 Unchanged
Timeline
- 🟡
Public PoC available
 - 👾
Exploit known to exist
 Vulnerability published
Vulnerability Reserved
Credit
Erwan LR (WPScan)
WPScan