cve/2023/CVE-2023-1430.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1430)
![](https://img.shields.io/static/v1?label=Product&message=Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20and%20CRM%20Plugin%20for%20WordPress%20by%20FluentCRM&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.7.40%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-759%20Use%20of%20a%20One-Way%20Hash%20without%20a%20Salt&color=brighgreen)
### Description
The FluentCRM - Marketing Automation For WordPress plugin for WordPress is vulnerable to unauthorized modification of data in versions up to, and including, 2.7.40 due to the use of an MD5 hash without a salt to control subscriptions. This makes it possible for unauthenticated attackers to unsubscribe users from lists and manage subscriptions, granted they gain access to any targeted subscribers email address.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/karlemilnikka/CVE-2023-1430
- https://github.com/nomi-sec/PoC-in-GitHub