
Cloud Vulnerability DB
A community-led vulnerabilities database
The ContentStudio plugin for WordPress contains an authorization bypass vulnerability (CVE-2023-0556) in versions up to and including 1.2.5. The vulnerability was discovered on January 6, 2023, and was fixed in version 1.2.6. The issue affects the plugin's functionality due to missing capability checks on several functions (NVD, WPScan).
The vulnerability stems from the absence of proper authorization checks in various plugin functions. This security flaw specifically affects the cstu_get_metadata function, allowing unauthenticated attackers to retrieve blog metadata, including the plugin's contentstudio_token. The vulnerability has received varying CVSS scores, with NVD assigning a score of 6.5 (Medium) and Wordfence rating it at 9.8 (Critical) (NVD).
The vulnerability allows unauthenticated attackers to obtain sensitive blog metadata, including the plugin's contentstudio_token. This token could potentially be used for other interactions with the plugin, such as creating posts in versions prior to 1.2.5. The exposure of such metadata could lead to unauthorized access and potential manipulation of the website's content (WPScan).
The vulnerability has been patched in version 1.2.6 of the ContentStudio plugin. Website administrators are strongly advised to update to this version or later to protect against potential exploitation. The update includes additional requirements for posting and updating functionality (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."