First published: Fri Jun 09 2023(Updated: )
The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers with subscriber-level or higher to make changes to the plugin's settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Melapress WP Activity Log | <=4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2284 is a vulnerability in the WP Activity Log Premium plugin for WordPress that allows authenticated attackers to modify data without proper permission checks.
CVE-2023-2284 has a severity rating of 4.3, which is considered medium.
CVE-2023-2284 affects versions of the WP Activity Log Premium plugin up to and including 4.5.0.
Authenticated attackers with subscriber-level or higher access are affected by CVE-2023-2284.
Yes, you can find references for CVE-2023-2284 at the following links: [Reference 1](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2911239%40wp-security-audit-log%2Ftrunk&old=2897171%40wp-security-audit-log%2Ftrunk&sfp_email=&sfph_mail=) and [Reference 2](https://www.wordfence.com/threat-intel/vulnerabilities/id/6e29fd6b-462a-42be-9a2a-b6717b20a937?source=cve).