🔐 CVE Alert

CVE-2023-2280

MEDIUM 6.5

WP Directory Kit <= 1.2.2 - Missing Authorization to Plugin Installation, Settings Change/Delete, Demo Import, Directory Kit Deletion via wdk_public_action

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'ajax_public' function in versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0 and an additional partial patch was introduced in version 1.2.2, but the issue was not fully patched until 1.2.3.

CWE CWE-862
Vendor wpdirectorykit
Product wp directory kit
Published Jun 9, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wpdirectorykit wp directory kit

Be the first to know when new medium vulnerabilities affecting wpdirectorykit wp directory kit are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

wpdirectorykit / WP Directory Kit
0 ≤ 1.2.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/abb1a758-5c16-4841-b1c7-0705ab16b328?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpdirectorykit/tags/1.1.8/public/class-wpdirectorykit-public.php#L249 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2907164/

Credits

Ramuel Gall István Márton