First published: Sat May 20 2023(Updated: )
The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation on the 'enable_safe_mode' function. This makes it possible for unauthenticated attackers to enable safe mode, which disables all other plugins, via a forged request if they can successfully trick an administrator into performing an action such as clicking on a link. A warning message about safe mode is displayed to the admin, which can be easily disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <=2.7.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2717 is a vulnerability in the Groundhogg plugin for WordPress that allows unauthenticated attackers to enable safe mode.
The severity of CVE-2023-2717 is medium with a CVSS score of 4.3.
CVE-2023-2717 affects the Groundhogg plugin by allowing unauthenticated attackers to enable safe mode.
To fix CVE-2023-2717, update the Groundhogg plugin to version 2.7.10 or later.
You can find more information about CVE-2023-2717 at the following references: [link1], [link2], [link3]