Vulnerability Details : CVE-2023-4915
The WP User Control plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 1.5.3. This is due to the plugin using native password reset functionality, with insufficient validation on the password reset function (in the WP User Control Widget). The function changes the user's password after providing the email. The new password is only sent to the user's email, so the attacker does not have access to the new password.
Products affected by CVE-2023-4915
- cpe:2.3:a:palmspark:wp_user_control:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-4915
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-4915
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
Wordfence |
CWE ids for CVE-2023-4915
-
When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.Assigned by: security@wordfence.com (Primary)
References for CVE-2023-4915
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/f4ca1736-7b99-49db-9367-586dbc14df41?source=cve
WP User Control <= 1.5.3 - Insecure Password Reset MechanismThird Party Advisory
-
https://plugins.trac.wordpress.org/browser/wp-user-control/tags/1.5.3/inc/WPUserControlWidget.php#L893
WPUserControlWidget.php in wp-user-control/tags/1.5.3/inc – WordPress Plugin RepositoryThird Party Advisory
Jump to