CVE-2023-1923
CVSS V2 None
CVSS V3 None
Description
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_remove_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Overview
- CVE ID
- CVE-2023-1923
- Assigner
- security@wordfence.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-06T20:15:08
- Last Modified Date
- 2023-04-12T23:59:11
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.1.2 |
References
Reference URL | Reference Tags |
---|---|
https://plugins.trac.wordpress.org/changeset/2893158/wp-fastest-cache/trunk/wpFastestCache.php?contextall=1 | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/49ba5cfa-c2cc-49ac-b22d-7e36ccca6ac5?source=cve | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-1923 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1923 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:18:51 | Added to TrackCVE | |||
2023-04-17 04:18:53 | Weakness Enumeration | new |