CVE-2023-6969

The User Shortcodes Plus plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.2 via the user_meta shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with contributor-level access and above, to retrieve potentially sensitive user meta.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kylebjohnson:user_shortcodes_plus:*:*:*:*:*:wordpress:*:*

History

07 Feb 2025, 19:33

Type Values Removed Values Added
CPE cpe:2.3:a:kylebjohnson:user_shortcodes_plus:*:*:*:*:*:wordpress:*:*
CWE CWE-639
References () https://plugins.trac.wordpress.org/browser/user-shortcodes-plus/trunk/includes/Shortcodes/UserMeta.php - () https://plugins.trac.wordpress.org/browser/user-shortcodes-plus/trunk/includes/Shortcodes/UserMeta.php - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/76a0a87a-dff0-4a51-bad0-8868c342ecde?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/76a0a87a-dff0-4a51-bad0-8868c342ecde?source=cve - Third Party Advisory
First Time Kylebjohnson
Kylebjohnson user Shortcodes Plus

Information

Published : 2024-03-13 16:15

Updated : 2025-02-07 19:33


NVD link : CVE-2023-6969

Mitre link : CVE-2023-6969

CVE.ORG link : CVE-2023-6969


JSON object : View

Products Affected

kylebjohnson

  • user_shortcodes_plus
CWE
CWE-639

Authorization Bypass Through User-Controlled Key