The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-34180 The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 13 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-01-13T16:48:38.115Z

Reserved: 2023-05-15T16:46:02.087Z

Link: CVE-2023-2716

cve-icon Vulnrichment

Updated: 2024-08-02T06:33:04.306Z

cve-icon NVD

Status : Modified

Published: 2023-05-20T03:15:09.157

Modified: 2024-11-21T07:59:09.430

Link: CVE-2023-2716

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.