Woostify Sites Library < 1.4.8 - Subscriber+ Arbitrary Options Update to DoS
CVE-2023-6279
Key Information:
- Vendor
Wordpress
- Status
- Vendor
- CVE Published:
- 29 January 2024
Badges
What is CVE-2023-6279?
The Woostify Sites Library WordPress plugin prior to version 1.4.8 is susceptible to an authorization bypass in its AJAX actions. This vulnerability allows any authenticated user, including those with basic subscriber privileges, to update any blog settings indiscriminately. When exploited, it can lead to Denial of Service (DoS) conditions by invoking specific option names, which can disrupt the normal function of a WordPress site. Users of the affected plugin versions are urged to update immediately to enhance their website's security.
Affected Version(s)
Woostify Sites Library 0 < 1.4.8
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved