The UserPro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.1. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. An attacker can leverage CVE-2023-2448 and CVE-2023-2446 to get the user's email address to successfully exploit this vulnerability.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681 | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-11-22T15:33:33.084Z
Updated: 2023-11-22T15:33:33.084Z
Reserved: 2023-05-01T09:41:14.173Z
Link: CVE-2023-2437
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-22T16:15:08.043
Modified: 2023-12-01T03:47:12.557
Link: CVE-2023-2437
JSON object: View
Redhat Information
No data.
CWE