
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2023-0940 vulnerability affects the ProfileGrid WordPress plugin versions before 5.3.1. This security flaw was discovered and publicly disclosed on February 27, 2023. The vulnerability exists in an AJAX endpoint designed for password reset functionality that lacks proper authorization controls (WPScan).
The vulnerability is classified as a 'No Authorization' flaw (CWE-862) and falls under the OWASP Top 10 category A5: Broken Access Control. It has been assigned a CVSS score of 8.8 (High), indicating its serious nature. The issue stems from an improperly secured AJAX endpoint that handles password reset functionality, which fails to implement adequate authorization checks (WPScan).
The vulnerability allows users with low-privilege accounts (such as subscribers) to modify the passwords of any user account on the system, including administrator accounts. This represents a critical security breach as it enables privilege escalation and potential complete site takeover (WPScan).
The vulnerability has been patched in ProfileGrid version 5.3.1. Site administrators running affected versions should immediately upgrade to version 5.3.1 or later to protect their installations (WPScan, Trustwave).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."