First published: Fri Nov 17 2023(Updated: )
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in AWeber AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth allows Accessing Functionality Not Properly Constrained by ACLs, Cross-Site Request Forgery.This issue affects AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth: from n/a through 7.3.9.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aweber Aweber | <7.3.10 |
Update to 7.3.10 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-47757 is high.
CVE-2023-47757 allows accessing functionality in the AWeber AWeber plugin that is not properly constrained by ACLs, potentially leading to unauthorized actions.
The affected software for CVE-2023-47757 is AWeber AWeber plugin <= 7.3.9.
Yes, a fix is available for CVE-2023-47757. It is recommended to update AWeber AWeber plugin to version 7.3.10 or higher.
The CWE classification for CVE-2023-47757 is CWE-352 (Cross-Site Request Forgery) and CWE-862 (Missing Authorization).