
Cloud Vulnerability DB
A community-led vulnerabilities database
The BestWebSoft's Like & Share WordPress plugin before version 2.74 contains a security vulnerability identified as CVE-2023-6250. The vulnerability was discovered by Krzysztof Zając from CERT PL and was publicly disclosed on November 29, 2023. This security issue affects the facebook-button-plugin component and has been assigned a CVSS score of 5.3 (medium) (WPScan).
The vulnerability is classified as an authentication bypass (AUTHBYPASS) issue, corresponding to CWE-287 and falling under the OWASP Top 10 category A2: Broken Authentication and Session Management. The technical issue involves the plugin disclosing the content of password-protected posts to unauthenticated users through a meta tag. Specifically, the vulnerability can be exploited by viewing the source of any password-protected post and examining the og:description meta tag (WPScan).
The vulnerability allows unauthorized users to access content that should be protected by a password. This breach of access control could lead to the exposure of sensitive or private information that was intended to be restricted to authenticated users only (WPScan).
The vulnerability has been fixed in version 2.74 of the BestWebSoft's Like & Share plugin. Website administrators running affected versions should update to version 2.74 or later to protect against this security issue (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."