CVE-2023-35039

Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bedevious:password_reset_with_code_for_wordpress_rest_api:*:*:*:*:*:wordpress:*:*

History

12 Dec 2023, 16:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:bedevious:password_reset_with_code_for_wordpress_rest_api:*:*:*:*:*:wordpress:*:*
References () https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cve - () https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cve - Third Party Advisory

07 Dec 2023, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-07 12:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-35039

Mitre link : CVE-2023-35039

CVE.ORG link : CVE-2023-35039


JSON object : View

Products Affected

bedevious

  • password_reset_with_code_for_wordpress_rest_api
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts