CVE-2023-4920
WordPress vulnerability analysis and mitigation

Overview

The BEAR for WordPress (also known as WooCommerce Bulk Editor and Products Manager Professional) contains a Cross-Site Request Forgery (CSRF) vulnerability in versions up to and including 1.1.3.3. The vulnerability was discovered and disclosed on September 25, 2023, and affects the plugin's woobesaveoptions function (NVD).

Technical details

The vulnerability stems from missing or incorrect nonce validation in the woobesaveoptions function. Additionally, the plugin has insufficient input sanitization and escaping mechanisms. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) by NIST with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, while Wordfence assessed it with a score of 4.3 (MEDIUM) (NVD).

Impact

The vulnerability allows unauthenticated attackers to modify the plugin's settings through forged requests if they can trick a site administrator into performing specific actions, such as clicking on a malicious link. The insufficient input sanitization and escaping can also lead to malicious script injection (NVD).

Mitigation and workarounds

Users should update to a version newer than 1.1.3.3 of the BEAR for WordPress plugin to address this vulnerability (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management