CVE-2023-6600

The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.
Configurations

Configuration 1 (hide)

cpe:2.3:a:daan:omgf:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 8.6
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3008876%40host-webfonts-local&new=3008876%40host-webfonts-local&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3008876%40host-webfonts-local&new=3008876%40host-webfonts-local&sfp_email=&sfph_mail= - Patch
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009010%40host-webfonts-local&new=3009010%40host-webfonts-local&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009010%40host-webfonts-local&new=3009010%40host-webfonts-local&sfp_email=&sfph_mail= - Patch
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009453%40host-webfonts-local&new=3009453%40host-webfonts-local&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009453%40host-webfonts-local&new=3009453%40host-webfonts-local&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4e835b97-c066-4e8f-b99f-1a930105af0c?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/4e835b97-c066-4e8f-b99f-1a930105af0c?source=cve - Third Party Advisory

10 Jan 2024, 01:15

Type Values Removed Values Added
CPE cpe:2.3:a:wpexperts:omgf:*:*:*:*:*:wordpress:*:* cpe:2.3:a:daan:omgf:*:*:*:*:*:wordpress:*:*
First Time Daan
Daan omgf

09 Jan 2024, 21:01

Type Values Removed Values Added
CWE CWE-79
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3008876%40host-webfonts-local&new=3008876%40host-webfonts-local&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3008876%40host-webfonts-local&new=3008876%40host-webfonts-local&sfp_email=&sfph_mail= - Patch
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009010%40host-webfonts-local&new=3009010%40host-webfonts-local&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009010%40host-webfonts-local&new=3009010%40host-webfonts-local&sfp_email=&sfph_mail= - Patch
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009453%40host-webfonts-local&new=3009453%40host-webfonts-local&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009453%40host-webfonts-local&new=3009453%40host-webfonts-local&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4e835b97-c066-4e8f-b99f-1a930105af0c?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/4e835b97-c066-4e8f-b99f-1a930105af0c?source=cve - Third Party Advisory
CPE cpe:2.3:a:wpexperts:omgf:*:*:*:*:*:wordpress:*:*
First Time Wpexperts omgf
Wpexperts
CVSS v2 : unknown
v3 : 8.6
v2 : unknown
v3 : 5.4

03 Jan 2024, 13:48

Type Values Removed Values Added
Summary
  • (es) OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress es vulnerable a modificaciones no autorizadas de datos y cross site scripting almacenado debido a una falta de verificación de capacidad en la función update_settings() conectada a través de admin_init en todas las versiones hasta la 5.7.9 inclusive. Esto hace posible que atacantes no autenticados actualicen la configuración del complemento, que puede usarse para inyectar payloads de Cross-Site Scripting y eliminar directorios completos. Tenga en cuenta que hubo varios intentos de parchear y consideramos que la versión 5.7.10 es la más parcheada.

03 Jan 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-03 06:15

Updated : 2025-06-03 15:15


NVD link : CVE-2023-6600

Mitre link : CVE-2023-6600

CVE.ORG link : CVE-2023-6600


JSON object : View

Products Affected

daan

  • omgf
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')