CVE-2023-2833
🟠 Łataj w tym tygodniu
Wtyczka ReviewX dla WordPressa pozwala na eskalację uprawnień przez nieodpowiednie ograniczenia.
CVSS
8.8
EPSS
26.8%
Exploit
poc
Vendor
wpdeveloper
Opis źródłowy (NVD)
The ReviewX plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.13 due to insufficient restriction on the 'rx_set_screen_options' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters during a screen option update.
exploit privilege-escalation
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 26.8% |
| Opublikowano (NVD) | 2023-06-06 10:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:18:05 UTC |
Referencje
- https://lana.codes/lanavdb/a889c3ff-5df0-4d7e-951f-0b0406468efa/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://plugins.trac.wordpress.org/browser/reviewx/tags/1.6.13/includes/rx-functions.php#L972 (security@wordfence.com) [Product]
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2916148%40reviewx&old=2912114%40reviewx&sfp_email=&sfph_mail=#file472 (security@wordfence.com) [Product]
- https://www.wordfence.com/blog/2023/05/wpdeveloper-addresses-privilege-escalation-vulnerability-in-reviewx-wordpress-plugin/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/70e1d701-2cff-4793-9e4c-5b16a4038e8d?source=cve (security@wordfence.com) [Exploit, Third Party Advisory]