CVE-2023-7202 – Fatal Error Notify – Error Email Sending CSRF

CVE-2023-7202 – Fatal Error Notify – Error Email Sending CSRF

In the process of scrutinizing the Fatal Error Notify plugin for WordPress, a Cross-Site Request Forgery (CSRF) vulnerability was unearthed. This flaw permits an unauthorized user to manipulate requests on behalf of the victim, enabling the attacker to send erroneous error messages via email. The exploit can involve sending a large volume of HTML-coded messages to the victim’s email, potentially causing disruption and spamming issues. Furthermore, the repeated suspicious activity might lead to the blocking of the WordPress site’s email.

CVE-2023-5713 – System Dashboard – Broken Logical Control to Mail Box password Thief – POC

CVE-2023-5713 – System Dashboard – Broken Logical Control to Mail Box password Thief – POC

During testing of the plugin, a vulnerability was discovered that allows the user, starting from the “Subscriber” (lower privs) privileges, to access AJAX requests that can output the following data: password and login from the database -which is very critical, password and login from the mailbox, phpinfo() and all the information that the plugin can output about the web application

CVE-2023-6592 – FastDup – Fastest WordPress Migration & Duplicator – Unauth Sensitive Data Exposure and Database/ Users password leak – POC/Exploit

CVE-2023-6592 – FastDup – Fastest WordPress Migration & Duplicator – Unauth Sensitive Data Exposure and Database/ Users password leak – POC/Exploit

A critical vulnerability has been unearthed within the FastDup – Fastest WordPress Migration & Duplicator plugin, residing in the directory wordpress/wp-content/njt-fastdup/packages. This vulnerability exposes a plethora of information about the WordPress site, encompassing its configuration details, directories, and files. More alarmingly, it allows unauthorized access to sensitive data housed within the database, including user passwords. The severity of this flaw is exemplified by the imminent threat it poses, creating a gateway for potential brute force attacks on password hashes and, consequently, the entire compromise of the system.

CVE-2023-6750 – Clone – Unauth Sensitive Data Exposure to Account Takeover/Backup Download – POC/Exploit

CVE-2023-6750 – Clone – Unauth Sensitive Data Exposure to Account Takeover/Backup Download – POC/Exploit

A critical vulnerability has been identified in the Clone plugin during testing, specifically within the directory /wordpress/wp-content/uploads/wp-clone/wpclone_backup. This flaw exposes comprehensive information about the site, encompassing its configuration, directories, and files. Most crucially, it grants unauthorized access to sensitive data within the database and all associated content. Exploiting this vulnerability introduces an imminent threat, potentially leading to brute force attacks on password hashes and, consequently, the compromise of the entire system.