cve/2023/CVE-2023-2546.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-2546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2546)
![](https://img.shields.io/static/v1?label=Product&message=WP%20User%20Switch&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.0.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&color=brighgreen)
### Description
The WP User Switch plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.2. This is due to incorrect authentication checking in the 'wpus_allow_user_to_admin_bar_menu' function with the 'wpus_who_switch' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the username.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/LUUANHDUC/KhaiThacLoHongPhanMem
2024-05-28 08:49:17 +00:00
- https://github.com/hung1111234/KhaiThacLoHongPhanMem
2024-05-25 21:48:12 +02:00