The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin.
References
Configurations
History
21 Nov 2024, 07:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/feather-login-page/trunk/features/inc/admin/expirable-login-link.php?rev=2612332#L71 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/5d58a6a4-de2c-485f-a8b0-7a7d144fbf3c?source=cve - Third Party Advisory |
Information
Published : 2023-05-31 03:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2547
Mitre link : CVE-2023-2547
CVE.ORG link : CVE-2023-2547
JSON object : View
Products Affected
featherplugins
- feather_login_page
CWE
CWE-862
Missing Authorization