The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to an unsecure token check that is susceptible to type juggling in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to execute functions intended for use by users with proper API keys.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/contentstudio/trunk/contentstudio-plugin.php#L416 | Exploit Release Notes Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/c31828dc-ef94-4895-8395-a5d52a0a82bd | Third Party Advisory |
https://ti.wordfence.io/vulnerabilities/52db8d41-859a-4d68-8b83-3d3af8f1bf64 | Permissions Required Third Party Advisory |
Configurations
Information
Published : 2023-01-27 14:15
Updated : 2023-02-06 06:42
NVD link : CVE-2023-0558
Mitre link : CVE-2023-0558
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
contentstudio
- contentstudio