Vulnerability Description
The WP Reset – Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 via the use of insufficiently random snapshot names. This makes it possible for unauthenticated attackers to extract sensitive data including site backups by brute-forcing the snapshot filenames. Please note that the vendor does not plan to do any further hardening on this functionality.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webfactoryltd | Wp Reset | < 2.01 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset?old_path=/wp-reset/tags/1.99&old=30Product
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/68f41e88-ed36-4361-bddThird Party Advisory
- https://plugins.trac.wordpress.org/changeset?old_path=/wp-reset/tags/1.99&old=30Product
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/68f41e88-ed36-4361-bddThird Party Advisory
FAQ
What is CVE-2023-6799?
CVE-2023-6799 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The WP Reset – Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 via the use of insufficiently random sn...
How severe is CVE-2023-6799?
CVE-2023-6799 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6799?
Check the references section above for vendor advisories and patch information. Affected products include: Webfactoryltd Wp Reset.