THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-6799

WP Reset <= 2.0 - Sensitive Information Exposure due to Insufficient Randomness

AssignerWordfence
Reserved2023-12-13
Published2024-04-09
Updated2024-07-05

Description

The WP Reset – Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 via the use of insufficiently random snapshot names. This makes it possible for unauthenticated attackers to extract sensitive data including site backups by brute-forcing the snapshot filenames. Please note that the vendor does not plan to do any further hardening on this functionality.



MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-330 Use of Insufficiently Random Values

Product status

Default status
unaffected

*
affected

Timeline

2024-03-26:Disclosed

Credits

Justin Kennedy finder

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/68f41e88-ed36-4361-bddd-41495a540cd9?source=cve

https://plugins.trac.wordpress.org/changeset?old_path=/wp-reset/tags/1.99&old=3059287&new_path=/wp-reset/tags/2.0&new=3059287&sfp_email=&sfph_mail=

https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071811%40wp-reset&new=3071811%40wp-reset&sfp_email=&sfph_mail=

cve.org CVE-2023-6799

nvd.nist.gov CVE-2023-6799

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-6799
© Copyright 2024 THREATINT. Made in Cyprus with +