First published: Tue Jul 18 2023(Updated: )
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metagauss Profilegrid | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-3713.
The severity of CVE-2023-3713 is high with a severity value of 8.8.
Versions up to and including 5.5.1 of the ProfileGrid plugin for WordPress are affected by CVE-2023-3713.
Authenticated attackers with subscriber-level permissions can exploit the vulnerability to perform unauthorized modification of data.
Yes, you can find references for CVE-2023-3713 at the following links: [Reference 1](https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.4.8/admin/class-profile-magic-admin.php#L599), [Reference 2](https://www.wordfence.com/threat-intel/vulnerabilities/id/473ba791-af99-4aae-99cb-ccf220e443e7?source=cve), [Reference 3](https://plugins.trac.wordpress.org/changeset/2938904/profilegrid-user-profiles-groups-and-communities#file0).