
Cloud Vulnerability DB
A community-led vulnerabilities database
The Easy Social Icons WordPress plugin contained a Missing Authorization vulnerability (CVE-2023-33998) in versions up to and including 3.2.4. The vulnerability was discovered by Nguyen Anh Tien and publicly disclosed on November 7, 2023. The security issue affects the plugin's cnsssaveajaxorder function, which lacked proper authorization checks (WPScan, [Patchstack](https://patchstack.com/database/wordpress/plugin/easy-social-icons/vulnerability/wordpress-easy-social-icons-plugin-3-2-4-broken-access-control-vulnerability?s_id=cve)).
The vulnerability is classified as a Missing Authorization (CWE-862) issue and received a CVSS v3.1 score of 4.3 (Medium), with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. The security flaw stems from a missing capability check in the cnsssaveajax_order function, falling under the OWASP Top 10 category A5: Broken Access Control (WPScan, NVD).
The vulnerability allows authenticated attackers with subscriber-level access or higher to modify the order of social icons without proper authorization. While the impact is relatively limited to interface modifications, it represents a breach in the intended access control mechanisms (WPScan).
The vulnerability has been patched in version 3.2.5 of the Easy Social Icons plugin. Website administrators are advised to update to version 3.2.6 or later to resolve the security issue. The fix implements proper authorization checks for the affected functionality (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."