
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-2628 affects the KiviCare WordPress plugin versions before 3.2.1. The vulnerability was discovered by Erwan LR and publicly disclosed on June 5, 2023. The plugin contains multiple Cross-Site Request Forgery (CSRF) vulnerabilities in various AJAX actions due to missing or flawed CSRF checks (WPScan Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The issue is classified as CWE-352 (Cross-Site Request Forgery). The vulnerability exists in various AJAX actions that lack proper CSRF protection mechanisms (NVD, WPScan Advisory).
The vulnerability allows attackers to make logged-in users perform unwanted actions through CSRF attacks. These actions include deleting arbitrary appointments and medical records, as well as creating and updating various user types such as patients and doctors (WPScan Advisory).
The vulnerability has been patched in version 3.2.1 of the KiviCare WordPress plugin. Users are advised to update to this version or later to protect against potential CSRF attacks (WPScan Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."