First published: Thu Jul 27 2023(Updated: )
The InstaWP Connect plugin for WordPress is vulnerable to unauthorized access of data, modification of data and loss of data due to a missing capability check on the 'events_receiver' function in versions up to, and including, 0.0.9.18. This makes it possible for unauthenticated attackers to add, modify or delete post and taxonomy, install, activate or deactivate plugin, change customizer settings, add or modify or delete user including administrator user.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
InstaWP Connect | <=0.0.9.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3956 is considered to be of high severity due to the potential for unauthorized access and data modification.
To remediate CVE-2023-3956, update the InstaWP Connect plugin to version 0.0.9.19 or later.
Users of the InstaWP Connect plugin for WordPress versions up to and including 0.0.9.18 are affected by CVE-2023-3956.
CVE-2023-3956 allows unauthenticated attackers to add, modify, or delete data due to a lack of proper capability checks.
No, CVE-2023-3956 is specific to the InstaWP Connect plugin and not a vulnerability in the WordPress core itself.