๐Ÿ” CVE Alert

CVE-2023-2549

HIGH 8.8
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address.

Vendor featherplugins
Product custom login page | temporary users | rebrand login | login captcha
Published May 31, 2023
Last Updated Jan 13, 2025
Stay Ahead of the Next One

Get instant alerts for featherplugins custom login page | temporary users | rebrand login | login captcha

Be the first to know when new high vulnerabilities affecting featherplugins custom login page | temporary users | rebrand login | login captcha are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

featherplugins / Custom Login Page | Temporary Users | Rebrand Login | Login Captcha
1.0.7 โ‰ค 1.1.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/12560b8e-9c47-4f7f-ac9c-d86f17914ba3?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/feather-login-page/trunk/features/inc/admin/expirable-login-link.php?rev=2612332#L206

Credits

Lana Codes