The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 03 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-06-03T14:09:37.869Z

Reserved: 2023-11-28T16:49:15.827Z

Link: CVE-2023-6369

cve-icon Vulnrichment

Updated: 2024-08-02T08:28:21.780Z

cve-icon NVD

Status : Modified

Published: 2024-01-11T09:15:48.380

Modified: 2025-06-03T14:15:37.713

Link: CVE-2023-6369

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.