CVE-2023-6799
low-risk
Published 2024-04-09
The WP Reset – Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 via the use of insufficiently random snapshot names. This makes it possible for unauthenticated attackers to extract sensitive data including site backups by brute-forcing the snapshot filenames. Please note that the vendor does not plan to do any further hardening on this functionality.
Do I need to act?
-
0.48% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Wp Reset
Affected Vendors
References (6)
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/68f41e88-ed36-4361-bdd...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/68f41e88-ed36-4361-bdd...
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal