First published: Fri Jun 09 2023(Updated: )
The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the anonymous function for the wpcs_sd_delete action in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete an arbitrary custom drop-down currency switcher.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pluginus Wordpress Currency Switcher | <1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2556.
The severity of CVE-2023-2556 is medium with a severity value of 4.3.
The affected software of CVE-2023-2556 is the WPCS – WordPress Currency Switcher Professional plugin for WordPress in versions up to, and including, 1.1.9.
This vulnerability can be exploited by unauthorized modification of data due to a missing capability check on the anonymous function for the wpcs_sd_delete action.
Yes, you can find references for CVE-2023-2556 at the following links: [Reference 1](https://plugins.trac.wordpress.org/changeset/2911049/currency-switcher) and [Reference 2](https://www.wordfence.com/threat-intel/vulnerabilities/id/bc44c95e-9ca0-46d0-8315-72612ef3f855?source=cve).