
Cloud Vulnerability DB
A community-led vulnerabilities database
A Broken Access Control vulnerability was identified in the WordPress Accept Stripe Payments plugin versions 2.0.79 and earlier. The vulnerability was discovered by Joshua Chan and was publicly disclosed on November 23, 2023. This security issue was assigned the identifier CVE-2023-48286 (Patchstack).
The vulnerability is classified as a Broken Access Control issue, which stems from missing authorization, authentication, or nonce token checks in certain functions. This could potentially allow unprivileged users to execute higher privileged actions. The vulnerability has been assigned a CVSS severity score of 8.2, categorizing it as Low severity despite the high CVSS score (Patchstack).
The vulnerability's impact is considered low severity and is deemed unlikely to be exploited. The specific impact varies case by case due to the nature of broken access control vulnerabilities (Patchstack).
The vulnerability has been fixed in version 2.0.80 of the WordPress Accept Stripe Payments plugin. Users are advised to update to version 2.0.80 or later to remediate this security issue (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."