First published: Mon Jul 10 2023(Updated: )
The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
tagDiv Cloud Library | <2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-1597.
CVE-2023-1597 has a severity rating of 8.8, which is classified as high.
The affected software is the tagDiv Cloud Library WordPress plugin before version 2.7.
An unauthenticated user can change arbitrary user metadata, which could lead to privilege escalation.
Yes, updating the tagDiv Cloud Library WordPress plugin to version 2.7 or later fixes the vulnerability.