First published: Mon May 08 2023(Updated: )
The Web Stories for WordPress plugin supports the WordPress built-in functionality of protecting content with a password. The content is then only accessible to website visitors after entering the password. In WordPress, users with the "Author" role can create stories, but don't have the ability to edit password protected stories. The vulnerability allowed users with said role to bypass this permission check when trying to duplicate the protected story in the plugin's own dashboard, giving them access to the seemingly protected content. We recommend upgrading to version 1.32 or beyond commit ad49781c2a35c5c92ef704d4b621ab4e5cb77d68 https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Web Stories | <1.32.0 | |
Google Web Stories | <1.32.0 |
https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1979 has been classified as a medium severity vulnerability affecting the Web Stories for WordPress plugin.
To fix CVE-2023-1979, update the Web Stories for WordPress plugin to version 1.32.0 or later.
CVE-2023-1979 can potentially allow unauthorized users to access password-protected content.
CVE-2023-1979 affects all versions of the Web Stories for WordPress plugin prior to 1.32.0.
Users with the 'Author' role in WordPress using an affected version of the Web Stories plugin are impacted by CVE-2023-1979.