Vulnerability Description
The FULL - Customer plugin for WordPress is vulnerable to Information Disclosure via the /health REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to obtain sensitive information about the site configuration as disclosed by the WordPress health check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Full | Full - Customer | <= 2.2.3 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/full-customer/tags/1.1.0/app/api/HealProduct
- https://plugins.trac.wordpress.org/browser/full-customer/tags/2.3/app/api/Contro
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a77d0fb5-8829-407d-a40Third Party Advisory
- https://plugins.trac.wordpress.org/browser/full-customer/tags/1.1.0/app/api/HealProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a77d0fb5-8829-407d-a40Third Party Advisory
FAQ
What is CVE-2023-4242?
CVE-2023-4242 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The FULL - Customer plugin for WordPress is vulnerable to Information Disclosure via the /health REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authentic...
How severe is CVE-2023-4242?
CVE-2023-4242 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4242?
Check the references section above for vendor advisories and patch information. Affected products include: Full Full - Customer.