4.3
CVE-2023-6506
- EPSS 0.14%
- Veröffentlicht 11.01.2024 07:15:08
- Zuletzt bearbeitet 03.06.2025 15:15:51
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WP 2FA <= 2.5.0 - Insecure Direct Object Reference to Arbitrary Email Sending
The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.
Mögliche Gegenmaßnahme
WP 2FA – Two-factor authentication for WordPress: Update to version 2.6.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP 2FA – Two-factor authentication for WordPress
Version
* - 2.5.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpwhitesecurity ≫ Wp 2fa SwPlatformwordpress Version <= 2.5.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.35 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
|
| security@wordfence.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.