First published: Thu Dec 07 2023(Updated: )
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_db_specs() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve data key specs.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bowo System Dashboard | <=2.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5714 has a high severity rating due to the potential for unauthorized access to sensitive data.
To fix CVE-2023-5714, update the System Dashboard plugin to version 2.8.8 or later.
CVE-2023-5714 affects all versions of the System Dashboard plugin for WordPress up to and including version 2.8.7.
No, only authenticated attackers with subscriber-level access can exploit CVE-2023-5714 due to the missing capability check.
CVE-2023-5714 allows unauthorized access to data that should be restricted based on user roles.