← Back to CVEs
CVE-2023-2987
CRITICAL9.8
Description
The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/31/2023
Last Modified4/8/2026
Sourcenvd
Honeypot Sightings0
Affected Products
wordapp:wordapp
Weaknesses (CWE)
CWE-345CWE-345
References
https://lana.report/publication/6e779e9a-e0f9-4102-9f0b-ad46e9c4533f/(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/wordapp/trunk/includes/access.php#L28(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/wordapp/trunk/includes/config.php#L59(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/wordapp/trunk/includes/pdx.php#L64(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/3063322/wordapp(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9d?source=cve(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/wordapp/trunk/includes/access.php#L28(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/wordapp/trunk/includes/config.php#L59(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/wordapp/trunk/includes/pdx.php#L64(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9d?source=cve(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.