Vulnerability Description
The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpwhitesecurity | Wp 2Fa | <= 2.5.0 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wp-2fa/trunk/includes/classes/Admin/cThird Party Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/caff9be6-4161-47a0-ba4ProductThird Party Advisory
- https://plugins.trac.wordpress.org/browser/wp-2fa/trunk/includes/classes/Admin/cThird Party Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/caff9be6-4161-47a0-ba4ProductThird Party Advisory
FAQ
What is CVE-2023-6506?
CVE-2023-6506 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email ...
How severe is CVE-2023-6506?
CVE-2023-6506 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6506?
Check the references section above for vendor advisories and patch information. Affected products include: Wpwhitesecurity Wp 2Fa.