CVE-2023-2549
The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address.
| Vendor | featherplugins |
| Product | custom login page | temporary users | rebrand login | login captcha |
| Published | May 31, 2023 |
| Last Updated | Jan 13, 2025 |
Get instant alerts for featherplugins custom login page | temporary users | rebrand login | login captcha
Be the first to know when new high vulnerabilities affecting featherplugins custom login page | temporary users | rebrand login | login captcha are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H