CVE-2023-1874
🟡 Monitoruj
Brak kontroli uprawnień w wtyczce WP Data Access pozwala na eskalację uprawnień użytkowników.
CVSS
7.5
EPSS
4.7%
Exploit
none
Vendor
wpdataaccess
Opis źródłowy (NVD)
The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site.
privilege-escalation
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 4.7% |
| Opublikowano (NVD) | 2023-04-12 14:15:07 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:17:55 UTC |
Referencje
- https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.7/WPDataRoles/WPDA_Roles.php#L50 (security@wordfence.com) [Not Applicable]
- https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L23 (security@wordfence.com) [Not Applicable]
- https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L50 (security@wordfence.com) [Not Applicable]
- https://www.wordfence.com/blog/2023/04/privilege-escalation-vulnerability-patched-promptly-in-wp-data-access-wordpress-plugin/ (security@wordfence.com)
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8f562e33-2aef-46f0-8a65-691155ede9e7?source=cve (security@wordfence.com) [Third Party Advisory]
- http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html (af854a3a-2127-422b-91ae-364da2661108) [Third Party Advisory, VDB Entry]