Vulnerabilities like this one are used in mass-exploit campaigns. Attackers use these to attack thousands of websites at a time, regardless of traffic size or popularity. Learn more.
As immediate action, update the affected plugin. If you're unable to do so, ask your hosting provider or web developer for help.
While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.
A broken access control issue refers to a missing authorization, authentication or nonce token check in a function that could lead to an unprivileged user to executing a certain higher privileged action.
CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.
This security issue has a low severity impact and is unlikely to be exploited.
Patchstack has issued a mitigation rule to block any attacks until you have updated to a patched version.
Update to version 1.23.00 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.
13 Feb, 2024
Early warning sent out to Patchstack customers
28 Jun, 2024
Published by Patchstack
28 Jun, 2024