First published: Fri Jun 09 2023(Updated: )
The Active Directory Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to missing nonce verification on the get_users function and insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to cause resource exhaustion via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
MiniOrange Active Directory Integration / LDAP Integration | <=4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2599.
The severity of CVE-2023-2599 is medium.
The Active Directory Integration plugin for WordPress becomes vulnerable due to missing nonce verification on the get_users function and insufficient escaping on the orderby and order parameters.
The affected software for CVE-2023-2599 is Miniorange Active Directory Integration / Ldap Integration plugin for WordPress versions up to, and including, 4.1.4.
To fix the vulnerability in the Active Directory Integration plugin, update to a version later than 4.1.4.