The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.
References
Configurations
History
25 May 2023, 19:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:groundhogg:groundhogg:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-862 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://plugins.trac.wordpress.org/browser/groundhogg/tags/2.7.9.8/admin/contacts/contacts-page.php#L458 - Third Party Advisory | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/3c5bde0e-3138-4995-92ae-6deaf6b7be5b?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/changeset/2914493/groundhogg/tags/2.7.10/admin/contacts/contacts-page.php - Third Party Advisory |
20 May 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-20 03:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-2716
Mitre link : CVE-2023-2716
CVE.ORG link : CVE-2023-2716
JSON object : View
Products Affected
groundhogg
- groundhogg
CWE
CWE-862
Missing Authorization