2024-07-14 02:06:08 +00:00

76 lines
3.0 KiB
JSON

{
"id": "CVE-2023-4915",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-13T03:15:09.247",
"lastModified": "2023-11-07T04:23:09.420",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP User Control plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 1.5.3. This is due to the plugin using native password reset functionality, with insufficient validation on the password reset function (in the WP User Control Widget). The function changes the user's password after providing the email. The new password is only sent to the user's email, so the attacker does not have access to the new password."
},
{
"lang": "es",
"value": "El complemento WP User Control para WordPress es vulnerable a restablecimientos de contrase\u00f1a no autorizados en versiones hasta la 1.5.3 inclusive. Esto se debe a que el complemento utiliza la funcionalidad nativa de restablecimiento de contrase\u00f1a, con una validaci\u00f3n insuficiente en la funci\u00f3n de restablecimiento de contrase\u00f1a (en el Widget de Control de Usuario de WP). La funci\u00f3n cambia la contrase\u00f1a del usuario despu\u00e9s de proporcionar el correo electr\u00f3nico. La nueva contrase\u00f1a s\u00f3lo se env\u00eda al correo electr\u00f3nico del usuario, por lo que el atacante no tiene acceso a la nueva contrase\u00f1a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palmspark:wp_user_control:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.5.3",
"matchCriteriaId": "42CEEB1A-F21D-44DB-9421-CE20B79BF005"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-user-control/tags/1.5.3/inc/WPUserControlWidget.php#L893",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4ca1736-7b99-49db-9367-586dbc14df41?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}