cve/2023/CVE-2023-3124.md

19 lines
935 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3124)
![](https://img.shields.io/static/v1?label=Product&message=Elementor%20Website%20Builder%20Pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%203.11.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen)
### Description
The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/AmirWhiteHat/CVE-2023-3124
- https://github.com/nomi-sec/PoC-in-GitHub