The LadiApp plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the publish_lp() function hooked via an AJAX action in versions up to, and including, 4.4. This makes it possible for authenticated attackers with subscriber-level access and above to change the LadiPage key (a key fully controlled by the attacker), enabling them to freely create new pages, including web pages that trigger stored XSS
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54576 | The LadiApp plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the publish_lp() function hooked via an AJAX action in versions up to, and including, 4.4. This makes it possible for authenticated attackers with subscriber-level access and above to change the LadiPage key (a key fully controlled by the attacker), enabling them to freely create new pages, including web pages that trigger stored XSS |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 15 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ladipage
Ladipage ladipage |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:ladipage:ladipage:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Ladipage
Ladipage ladipage |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-02T07:38:00.506Z
Reserved: 2023-09-01T21:36:58.941Z
Link: CVE-2023-4728
Updated: 2024-08-02T07:38:00.506Z
Status : Analyzed
Published: 2024-03-12T10:15:08.017
Modified: 2025-01-15T16:31:50.053
Link: CVE-2023-4728
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD