CVE-2023-6390
WordPress vulnerability analysis and mitigation

Overview

The WordPress Users plugin version 1.4 and below contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2023-6390. The vulnerability was discovered by Daniel Ruf and publicly disclosed on January 3, 2024. The issue affects the plugin's settings update functionality, which lacks proper CSRF protection mechanisms (WPScan).

Technical details

The vulnerability stems from the absence of CSRF protection checks when updating the plugin's settings. This security flaw has been assigned a CVSS score of 4.3 (medium severity) and is classified under CWE-352. The vulnerability falls under the OWASP Top 10 category A2: Broken Authentication and Session Management (WPScan).

Impact

An attacker could potentially exploit this vulnerability to make unauthorized changes to the plugin's settings by tricking an authenticated administrator into executing malicious requests. The attack requires the victim to be logged in as an Editor or above role when accessing a specially crafted HTML page (WPScan).

Mitigation and workarounds

Currently, there is no known fix available for this vulnerability. Users of the WordPress Users plugin version 1.4 and below should consider implementing additional security measures or exploring alternative plugins until a patch is released (WPScan).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23550CRITICAL10
  • modular-connector
NoYesJan 14, 2026
CVE-2025-12166HIGH7.5
  • simply-schedule-appointments
NoYesJan 14, 2026
CVE-2026-0813MEDIUM4.4
  • short-link
NoNoJan 14, 2026
CVE-2026-0812MEDIUM4.4
  • linkedin-sc
NoNoJan 14, 2026
CVE-2026-0741MEDIUM4.4
  • electric-studio-download-counter
NoNoJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management