First published: Sat May 20 2023(Updated: )
The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <=2.7.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2023-2716 is a vulnerability in the Groundhogg plugin for WordPress that allows unauthorized access and modification of data.
The severity of CVE-2023-2716 is medium with a CVSS score of 5.4.
Vulnerability CVE-2023-2716 occurs due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8 of the Groundhogg plugin for WordPress.
Users of the Groundhogg plugin for WordPress versions up to, and including, 2.7.9.8 are affected by vulnerability CVE-2023-2716.
To mitigate vulnerability CVE-2023-2716, users should update to a version higher than 2.7.9.8 of the Groundhogg plugin for WordPress.