The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to obtain the blog metadata (via the function cstu_get_metadata) that includes the plugin's contentstudio_token. Knowing this token allows for other interactions with the plugin such as creating posts in versions prior to 1.2.5, which added other requirements to posting and updating.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/contentstudio/tags/1.2.1/contentstudio-plugin.php#L517 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2851006%40contentstudio%2Ftrunk&old=2844028%40contentstudio%2Ftrunk&sfp_email=&sfph_mail= | Patch Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/52db8d41-859a-4d68-8b83-3d3af8f1bf64 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-01-27T21:08:16.313Z
Updated:
Reserved: 2023-01-27T21:02:03.555Z
Link: CVE-2023-0556
JSON object: View
NVD Information
Status : Modified
Published: 2023-01-27T22:15:09.147
Modified: 2023-11-07T04:00:47.670
Link: CVE-2023-0556
JSON object: View
Redhat Information
No data.
CWE
No CWE.