First published: Fri Jun 09 2023(Updated: )
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscriber-level access or higher, to obtain a list of users with accounts on the site. This includes ids, usernames and emails.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Melapress WP Activity Log | <=4.5.0 | |
Melapress WP Activity Log | <=4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2261 is a vulnerability in the WP Activity Log plugin for WordPress that allows authenticated attackers to bypass authorization and obtain a list of users.
CVE-2023-2261 allows authenticated attackers with subscriber-level access or higher to bypass authorization and view a list of users.
CVE-2023-2261 has a severity rating of 4.3 (medium).
To fix CVE-2023-2261, update the WP Activity Log plugin to version 4.5.1 or later.
You can find more information about CVE-2023-2261 on the Wordfence website and the official WordPress plugin repository.