Unauthorized Data Modification in ShopLentor Plugin for WordPress
CVE-2023-7067

4.3MEDIUM

Summary

The ShopLentor plugin for WordPress, specifically versions up to and including 2.8.1, is susceptible to unauthorized modification of data due to an inadequate capability check on the 'woolentor_template_store' function. Authenticated attackers with contributor access or higher can exploit this flaw, allowing them to manipulate the nonce linked to this function and set a blank template as the default. This exposes websites using this plugin to potential data integrity issues.

Affected Version(s)

ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) * <= 2.8.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lucio Sá
.