First published: Thu Dec 07 2023(Updated: )
Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bedevious Password Reset With Code For Wordpress Rest Api | <0.0.16 |
Update to 0.0.16 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35039 has been classified as a vulnerability that allows for authentication abuse due to excessive attempts.
To mitigate CVE-2023-35039, update the Be Devious Password Reset with Code for WordPress REST API to version 0.0.16 or later.
CVE-2023-35039 affects Be Devious Password Reset with Code for WordPress REST API versions ranging from n/a to 0.0.15.
CVE-2023-35039 is categorized as an improper restriction of excessive authentication attempts vulnerability.
Yes, CVE-2023-35039 can potentially allow privilege escalation due to weak authentication mechanisms.