First published: Sat May 20 2023(Updated: )
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'submit_ticket' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers to create a support ticket that sends the website's data to the plugin developer, and it is also possible to create an admin access with an auto login link that is also sent to the plugin developer with the ticket. It only works if the plugin is activated with a valid license.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <=2.7.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2715.
CVE-2023-2715 has a severity rating of 4.3 (medium).
The affected software is the Groundhogg plugin for WordPress versions up to, and including, 2.7.9.8.
CVE-2023-2715 allows authenticated attackers to create a support ticket that sends the website's data without proper authorization.
Yes, you can find references for CVE-2023-2715 at the following links: [link1], [link2], [link3].