First published: Wed Jun 28 2023(Updated: )
The Subscribe2 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.40. This is due to missing or incorrect nonce validation when sending test emails. This makes it possible for unauthenticated attackers to send test emails with custom content to users on sites running a vulnerable version of this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Subscribe2 Project Subscribe2 | <=10.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3407 is a vulnerability in the Subscribe2 plugin for WordPress that allows unauthenticated attackers to send test emails with custom content.
CVE-2023-3407 has a severity rating of 4.3, which is considered medium.
Versions up to and including 10.40 of the Subscribe2 plugin for WordPress are affected by CVE-2023-3407.
To fix CVE-2023-3407, users should update to the latest version of the Subscribe2 plugin for WordPress.
More information about CVE-2023-3407 can be found at the following references: [Reference 1](https://plugins.trac.wordpress.org/browser/subscribe2/trunk/admin/send-email.php#L12), [Reference 2](https://plugins.trac.wordpress.org/changeset/2930676), [Reference 3](https://www.wordfence.com/threat-intel/vulnerabilities/id/92b4d800-2895-4f7b-8b3b-ee6df75a7908?source=cve).