CVE-2023-4307

CVSS 3.1 Score 4.3 of 10 (medium)

Details

Published Sep 11, 2023
Updated: Nov 7, 2023
CWE ID 352

Summary

CVE-2023-4307, also known as the Lock User Account WordPress plugin vulnerability, affects versions up to 1.0.3 of the plugin. This vulnerability allows attackers to perform Cross-Site Request Forgery (CSRF) attacks when bulk locking and unlocking user accounts. As a result, logged-in administrators can unknowingly lock or unlock arbitrary user accounts. To remediate this vulnerability, affected organizations should update the Lock User Account WordPress plugin to version 1.0.4 or later, which includes a CSRF check to prevent such attacks. This vulnerability poses a medium risk with a base severity score of 4.3 according to [email protected], as it requires user interaction and network access but has low integrity and confidentiality impacts.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-4307 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions