6.5

CVE-2023-47191

Youzify <= 1.2.2 - Insecure Direct Object Reference

Authorization Bypass Through User-Controlled Key vulnerability in KaineLabs Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress.This issue affects Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress: from n/a through 1.2.2.

Mögliche Gegenmaßnahme
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress: Update to version 1.2.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress
Version *-1.2.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
KainelabsYouzify SwPlatformwordpress Version < 1.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.17% 0.384
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
audit@patchstack.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.