First published: Thu Aug 31 2023(Updated: )
The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_update_steps_ajax_handler, badgeos_update_award_steps_ajax_handler, badgeos_update_deduct_steps_ajax_handler, and badgeos_update_ranks_req_steps_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to overwrite arbitrary post titles.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
For The Badge | <=3.7.1.6 |
https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/award-steps-ui.php#L397
https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/deduct-steps-ui.php#L454
https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/ranks/rank-steps-ui.php#L388
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2172 has a medium severity level due to its potential for unauthorized access to user data.
To fix CVE-2023-2172, update the BadgeOS plugin to version 3.7.1.7 or later.
CVE-2023-2172 is caused by improper validation and authorization checks in the BadgeOS plugin.
BadgeOS versions up to and including 3.7.1.6 are affected by CVE-2023-2172.
Exploitation of CVE-2023-2172 could allow attackers to access or modify user data without proper authorization.