First published: Sat Aug 17 2024(Updated: )
The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_player function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to update player instances.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Softlabbd Radio Player | <2.0.74 |
https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4025 is classified as a high severity vulnerability due to the potential for unauthorized data modification.
CVE-2023-4025 affects all versions of the Radio Player plugin for WordPress up to and including 2.0.73.
To fix CVE-2023-4025, upgrade the Radio Player plugin to version 2.0.74 or later.
CVE-2023-4025 allows unauthenticated attackers to modify player instances through the update_player function.
No, exploitation of CVE-2023-4025 does not require user authentication.