
Cloud Vulnerability DB
A community-led vulnerabilities database
The Post Meta Data Manager plugin for WordPress (versions up to 1.2.0) contains a vulnerability identified as CVE-2023-5425, discovered in October 2023. The vulnerability stems from missing capability checks on the pmdm_wp_change_user_meta and pmdm_wp_change_post_meta functions, which allows authenticated attackers with subscriber-level permissions or higher to potentially gain elevated privileges, including administrator access (NVD).
The vulnerability is characterized by insufficient authorization controls in the plugin's core functions. It has received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact potential across confidentiality, integrity, and availability (Wordfence).
The vulnerability enables authenticated attackers to modify user and post metadata without proper authorization. This can lead to privilege escalation, potentially allowing attackers to gain administrator-level access to the WordPress installation, compromising the entire site's security (NVD).
Website administrators using the Post Meta Data Manager plugin should immediately update to version 1.2.1 or later, which contains the security fix. The patch has been implemented and is available through the WordPress plugin repository (WordPress).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."