CVE-2023-47770
WordPress vulnerability analysis and mitigation

Overview

The Betheme WordPress theme contains a Missing Authorization vulnerability (CVE-2023-47770) that affects versions up to and including 27.1.1. The vulnerability was discovered by Rafie Muhammad and publicly disclosed on November 14, 2023. This security issue is related to unauthorized access of functionality due to missing capability checks in the theme's functions (WPScan, Patchstack).

Technical details

The vulnerability is classified as a Missing Authorization (CWE-862) issue and has received a CVSS v3.1 base score of 7.6 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H. The security flaw stems from a broken access control implementation where certain functions lack proper capability checks (Patchstack).

Impact

The vulnerability allows authenticated attackers with contributor-level access or higher to invoke restricted functions without proper authorization. This broken access control issue could potentially lead to unauthorized actions being performed on affected WordPress installations (WPScan).

Mitigation and workarounds

The vulnerability has been patched in Betheme version 27.1.2. Users are strongly advised to update to this version or later to resolve the security issue. For those unable to update immediately, Patchstack has issued a virtual patch to mitigate this issue by blocking potential attacks (Patchstack).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management