A critical security vulnerability has been identified in the Debug Log Manager plugin, marked by a missing authorization check during the handling of the action=clear_log method. This lapse in validation opens the door to Cross-Site Request Forgery (CSRF) attacks, providing unauthorized actors with the ability to clear PHP logs in the affected plugin.
CVE-2023-6592 – FastDup – Fastest WordPress Migration & Duplicator – Unauth Sensitive Data Exposure and Database/ Users password leak – POC/Exploit

A critical vulnerability has been unearthed within the FastDup – Fastest WordPress Migration & Duplicator plugin, residing in the directory wordpress/wp-content/njt-fastdup/packages. This vulnerability exposes a plethora of information about the WordPress site, encompassing its configuration details, directories, and files. More alarmingly, it allows unauthorized access to sensitive data housed within the database, including user passwords. The severity of this flaw is exemplified by the imminent threat it poses, creating a gateway for potential brute force attacks on password hashes and, consequently, the entire compromise of the system.
CVE-2023-5448 – WP Register Profile With Shortcode – CSRF to password Reset – POC
CVE-2023-7204 – WP-STAGING – Unauth Sensitive Data Exposure and Database password leak – POC/Exploit

In a recent examination of the WP-STAGING plugin, a highly critical vulnerability was uncovered, posing an existential threat to the security of WordPress installations. This flaw resides in the directory /wordpress/wp-content/uploads/wp-staging/ and exposes not only intricate details about the site’s
CVE-2023-6384 – WP User Profile Avatar – Avatar Deletion/Update via IDOR – POC
CVE-2023-6530 – TJ Shortcodes – Stored XSS via shortcode – POC
CVE-2023-6991 – JSM file_get_contents() Shortcode – SSRF- POC
CVE-2023-6750 – Clone – Unauth Sensitive Data Exposure to Account Takeover/Backup Download – POC/Exploit

A critical vulnerability has been identified in the Clone plugin during testing, specifically within the directory /wordpress/wp-content/uploads/wp-clone/wpclone_backup. This flaw exposes comprehensive information about the site, encompassing its configuration, directories, and files. Most crucially, it grants unauthorized access to sensitive data within the database and all associated content. Exploiting this vulnerability introduces an imminent threat, potentially leading to brute force attacks on password hashes and, consequently, the compromise of the entire system.
CVE-2023-6383 – Debug Log Manager – Directory Listing to Sensitive logs exposure – POC
CVE-2023-6505 – Prime Mover – Directory Listing to Account Takeover and Sensitive Data Exposure – POC/Exploit

A critical vulnerability has been uncovered in the Prime Mover plugin, specifically within the directory http://your_site/wordpress/wp-content/uploads/prime-mover-export-files/1/. This vulnerability not only reveals comprehensive information about the site, including its configuration, directories, and files, but more critically, it grants unauthorized access to sensitive data within the database, presenting a significant security risk. The exploitation of this vulnerability could lead to potential brute force attacks on password hashes, posing an imminent threat to the compromise of the entire system.