Vulnerability Description
The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Groundhogg | Groundhogg | <= 2.7.9.8 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/groundhogg/tags/2.7.9.8/admin/contactThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2914493/groundhogg/tags/2.7.10/admiThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3c5bde0e-3138-4995-92aThird Party Advisory
- https://plugins.trac.wordpress.org/browser/groundhogg/tags/2.7.9.8/admin/contactThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2914493/groundhogg/tags/2.7.10/admiThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3c5bde0e-3138-4995-92aThird Party Advisory
FAQ
What is CVE-2023-2716?
CVE-2023-2716 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and in...
How severe is CVE-2023-2716?
CVE-2023-2716 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2716?
Check the references section above for vendor advisories and patch information. Affected products include: Groundhogg Groundhogg.