First published: Mon Apr 24 2023(Updated: )
The Custom Post Type UI WordPress plugin before 1.13.5 does not properly check for CSRF when sending the debug information to a user supplied email, which could allow attackers to make a logged in admin send such information to an arbitrary email address via a CSRF attack.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webdevstudios Custom Post Type Ui | <1.13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1623 is considered medium due to its potential for exploitation through CSRF attacks.
To fix CVE-2023-1623, update the Custom Post Type UI plugin to version 1.13.5 or later.
CVE-2023-1623 exploits a failure to properly check for CSRF, allowing attackers to send debug information to arbitrary email addresses.
Users of the Custom Post Type UI WordPress plugin prior to version 1.13.5 are affected by CVE-2023-1623.
CVE-2023-1623 is associated with Cross-Site Request Forgery (CSRF) attacks.