
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2023-1888 affects the Directorist WordPress plugin versions up to 7.5.4. This security flaw allows authenticated attackers with subscriber-level access to perform arbitrary user password resets, potentially leading to privilege escalation. The vulnerability was publicly disclosed on June 1, 2023, and was discovered by Alex Thomas from Wordfence (Wordfence Report).
The vulnerability exists due to insufficient validation checks within the login.php file of the Directorist plugin. The flaw has been assigned a CVSS score of 8.8 (High), indicating its significant severity. The vulnerability allows authenticated users with subscriber-level privileges to execute unauthorized password reset operations (Wordfence Report).
When exploited, this vulnerability enables authenticated attackers with subscriber-level access to reset passwords of other users on the system. This could lead to privilege escalation and unauthorized access to higher-privileged accounts, potentially compromising the security of the entire WordPress installation (Wordfence Report).
Website administrators running affected versions of the Directorist plugin should immediately update to a patched version. The vulnerability has been addressed in subsequent releases of the plugin (Wordfence Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."