The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation in the 'ajax_edit_contact' function. This makes it possible for authenticated attackers to receive the auto login link via shortcode and then modify the assigned user to the auto login link to elevate verified user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Mon, 13 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-05-20T02:03:23.875Z

Updated: 2025-01-13T16:48:29.235Z

Reserved: 2023-05-16T13:17:27.854Z

Link: CVE-2023-2736

cve-icon Vulnrichment

Updated: 2024-08-02T06:33:05.227Z

cve-icon NVD

Status : Modified

Published: 2023-05-20T03:15:09.397

Modified: 2024-11-21T07:59:11.743

Link: CVE-2023-2736

cve-icon Redhat

No data.