
Cloud Vulnerability DB
A community-led vulnerabilities database
The Enable/Disable Auto Login when Register WordPress plugin through version 1.1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability. The vulnerability was discovered and publicly disclosed on April 17, 2023, and was assigned CVE-2023-0522. This security flaw affects the plugin's settings update functionality (WPScan).
The vulnerability stems from the absence of CSRF protection mechanisms when updating the plugin's settings. It has been classified as CWE-352 and received a CVSS score of 4.3 (medium severity). The vulnerability falls under the OWASP Top 10 category A2: Broken Authentication and Session Management (WPScan).
An attacker could potentially exploit this vulnerability to modify the plugin's settings by tricking an authenticated administrator into performing unwanted actions. This could lead to unauthorized changes in the auto-login functionality of the WordPress installation (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue. Users of the affected plugin should consider implementing additional security measures or potentially removing the plugin until a patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."