
Cloud Vulnerability DB
A community-led vulnerabilities database
The SmartCrawl WordPress plugin (versions before 3.8.3) contains a security vulnerability identified as CVE-2023-5949. This vulnerability allows unauthorized users to access password-protected posts' content, representing a significant security weakness in the plugin's access control mechanism. The issue was discovered and reported by Krzysztof Zając from CERT PL (WPScan).
The vulnerability is classified as a Missing Authorization issue (CWE-862) with a CVSS 3.1 Base Score of 7.5 (HIGH), indicating a serious security concern. The vulnerability vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, suggesting that it can be exploited remotely with low attack complexity and requires no privileges or user interaction (NVD).
When exploited, this vulnerability allows unauthorized users to view the content of password-protected posts by examining the page source code. The sensitive content is exposed through meta and script tags, effectively bypassing the password protection mechanism (WPScan).
The vulnerability has been fixed in SmartCrawl WordPress plugin version 3.8.3. Users are strongly advised to update to this version or later to protect their password-protected content (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."