First published: Thu Jan 19 2023(Updated: )
The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Warfareplugins Social Warfare | <=4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0402 is a vulnerability in the Social Warfare plugin for WordPress that allows authenticated attackers to bypass authorization and delete post meta information.
The severity of CVE-2023-0402 is medium with a severity value of 5.4.
CVE-2023-0402 affects the Social Warfare plugin for WordPress versions up to and including 4.3.0.
The Common Weakness Enumeration (CWE) ID of CVE-2023-0402 is 862.
Yes, you can find references for CVE-2023-0402 at the following links: [Link 1](https://plugins.trac.wordpress.org/browser/social-warfare/trunk/lib/options/SWP_Options_Page.php?rev=2364155#L923), [Link 2](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2844092%40social-warfare&new=2844092%40social-warfare&sfp_email=&sfph_mail=), [Link 3](https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc4ba2c-32eb-46c5-bb40-7c0150fc1ca4).