
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-44473) affects the WordPress Table of Contents Plus plugin versions 2302 and earlier. It was discovered and reported by Muhammad Daffa on August 27, 2023, and was publicly disclosed on September 29, 2023. The vulnerability is a Cross-Site Request Forgery (CSRF) issue that affects the plugin's settings update functionality (Patchstack, WPScan).
The vulnerability is classified as a Cross-Site Request Forgery (CSRF) with a CVSS v3.1 base score of 5.4 (Medium) according to Patchstack, while the NVD assessment shows a higher score of 8.8 (High). The vulnerability exists due to the absence of CSRF checks when updating the plugin's settings. The issue is tracked under CWE-352 (Cross-Site Request Forgery) (Patchstack).
The vulnerability could allow attackers to make a logged-in administrator change the plugin's settings through a CSRF attack. This means that if an authenticated administrator visits a malicious page while logged into their WordPress site, the attacker could potentially modify the plugin's settings without the administrator's knowledge or consent (WPScan).
The vulnerability has been fixed in version 2309 of the Table of Contents Plus plugin. Site administrators are advised to update to this version or later to remove the vulnerability. For users unable to update immediately, Patchstack has issued a virtual patch to mitigate this issue by blocking potential attacks (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."