The WP User Control plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 1.5.3. This is due to the plugin using native password reset functionality, with insufficient validation on the password reset function (in the WP User Control Widget). The function changes the user's password after providing the email. The new password is only sent to the user's email, so the attacker does not have access to the new password.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/wp-user-control/tags/1.5.3/inc/WPUserControlWidget.php#L893 | Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/f4ca1736-7b99-49db-9367-586dbc14df41?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-09-13T02:54:13.256Z
Updated: 2023-09-13T02:54:13.256Z
Reserved: 2023-09-12T14:49:28.568Z
Link: CVE-2023-4915
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-13T03:15:09.247
Modified: 2023-11-07T04:23:09.420
Link: CVE-2023-4915
JSON object: View
Redhat Information
No data.
CWE
No CWE.