
Cloud Vulnerability DB
A community-led vulnerabilities database
The Cross-Site Request Forgery (CSRF) vulnerability, identified as CVE-2022-23976, was discovered in the WordPress Access Demo Importer plugin versions 1.0.7 and below. The vulnerability was disclosed on January 24, 2022, and affects the plugin's data management functionality. This security flaw could potentially allow attackers to manipulate website content, including posts, pages, and media files (Patchstack).
The vulnerability has been assigned a CVSS score of 8.1, indicating a high severity level. The security flaw is classified under the OWASP Top 10 category A5: Broken Access Control. The vulnerability specifically relates to Cross-Site Request Forgery (CSRF) protection mechanisms, allowing unauthenticated attackers to perform unauthorized actions (Patchstack).
If exploited, this vulnerability could allow attackers to force privileged users to execute unwanted actions, specifically the ability to reset all data including posts, pages, and media files on the affected WordPress installation (Patchstack).
The vulnerability was patched in version 1.0.8 of the Access Demo Importer plugin. Website administrators are advised to update to version 1.0.8 or later to resolve the security issue. It's worth noting that as of March 30, 2023, the plugin has been closed and is no longer available for download due to guideline violations (WordPress Plugin, Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."