Vulnerability Description
The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Featherplugins | Feather Login Page | >= 1.0.7, <= 1.1.1 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/feather-login-page/trunk/features/incPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5d58a6a4-de2c-485f-a8bThird Party Advisory
- https://plugins.trac.wordpress.org/browser/feather-login-page/trunk/features/incPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5d58a6a4-de2c-485f-a8bThird Party Advisory
FAQ
What is CVE-2023-2547?
CVE-2023-2547 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and includi...
How severe is CVE-2023-2547?
CVE-2023-2547 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2547?
Check the references section above for vendor advisories and patch information. Affected products include: Featherplugins Feather Login Page.