Vulnerability Details : CVE-2023-6965
The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This is due to the fact that the plugin allows the use of a file inclusion feature via shortcode. This makes it possible for authenticated attackers, with contributor access or higher, to create pods and users (with default role).
Products affected by CVE-2023-6965
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6965
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6965
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
Wordfence | 2024-04-09 |
CWE ids for CVE-2023-6965
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-6965
-
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=
429 Too Many RequestsProduct
-
https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750
429 Too Many RequestsProduct
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve
Pods - Custom Content Types and Fields - Missing AuthorizationThird Party Advisory
Jump to