The LadiApp plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the publish_lp() function hooked via an AJAX action in versions up to, and including, 4.4. This makes it possible for authenticated attackers with subscriber-level access and above to change the LadiPage key (a key fully controlled by the attacker), enabling them to freely create new pages, including web pages that trigger stored XSS
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ladipage
Ladipage ladipage |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:ladipage:ladipage:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Ladipage
Ladipage ladipage |
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-03-12T09:33:55.846Z
Updated: 2024-08-02T07:38:00.506Z
Reserved: 2023-09-01T21:36:58.941Z
Link: CVE-2023-4728
Vulnrichment
Updated: 2024-08-02T07:38:00.506Z
NVD
Status : Analyzed
Published: 2024-03-12T10:15:08.017
Modified: 2025-01-15T16:31:50.053
Link: CVE-2023-4728
Redhat
No data.