Vulnerability Description
The Simplr Registration Form Plus+ plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.4.5. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with subscriber-level permissions or above to change user passwords and potentially take over administrator accounts.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mikevanwinkle | Simplr Registration Form Plus\+ | <= 2.4.5 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/simplr-registration-form/trunk/lib/prThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6ddf0452-3afe-4ada-bccThird Party Advisory
- https://plugins.trac.wordpress.org/browser/simplr-registration-form/trunk/lib/prThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6ddf0452-3afe-4ada-bccThird Party Advisory
FAQ
What is CVE-2023-4213?
CVE-2023-4213 is a vulnerability with a CVSS score of 8.8 (HIGH). The Simplr Registration Form Plus+ plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.4.5. This is due to the plugin providing user-controlled ...
How severe is CVE-2023-4213?
CVE-2023-4213 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4213?
Check the references section above for vendor advisories and patch information. Affected products include: Mikevanwinkle Simplr Registration Form Plus\+.