First published: Mon Nov 27 2023(Updated: )
The 10Web Booster WordPress plugin before 2.24.18 does not validate the option name given to some AJAX actions, allowing unauthenticated users to delete arbitrary options from the database, leading to denial of service.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
10web 10web Booster | <2.24.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-5559.
The title of the vulnerability is '10Web Booster < 2.24.18 - Unauthenticated Arbitrary Option Deletion'.
The severity of CVE-2023-5559 is critical, with a CVSS score of 9.1.
CVE-2023-5559 affects the 10Web Booster WordPress plugin versions up to and excluding 2.24.18.
An unauthenticated user can exploit CVE-2023-5559 by sending a specially crafted AJAX request to delete arbitrary options from the database, resulting in denial of service.