Unauthorized Data Modification in ShopLentor Plugin for WordPress
CVE-2023-7067
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 2 May 2024
Summary
The ShopLentor plugin for WordPress, specifically versions up to and including 2.8.1, is susceptible to unauthorized modification of data due to an inadequate capability check on the 'woolentor_template_store' function. Authenticated attackers with contributor access or higher can exploit this flaw, allowing them to manipulate the nonce linked to this function and set a blank template as the default. This exposes websites using this plugin to potential data integrity issues.
Affected Version(s)
ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) * <= 2.8.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lucio Sá