🔐 CVE Alert

CVE-2023-3447

HIGH 7.6

Active Directory Integration / LDAP Integration <= 4.1.5 - Authenticated (Subscriber+) LDAP Injection

CVSS Score
7.6
EPSS Score
0.0%
EPSS Percentile
0th

The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Injection in versions up to, and including, 4.1.5. This is due to insufficient escaping on the supplied username value. This makes it possible for attackers, with an existing account on a vulnerable WordPress instance, to extract potentially sensitive information from the LDAP directory.

CWE CWE-90
Vendor cyberlord92
Product active directory integration / ldap integration
Published Jun 29, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for cyberlord92 active directory integration / ldap integration

Be the first to know when new high vulnerabilities affecting cyberlord92 active directory integration / ldap integration are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

cyberlord92 / Active Directory Integration / LDAP Integration
0 ≤ 4.1.5

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7553e8-e43d-4740-b2ee-e3d8dc351e53?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2928150%40ldap-login-for-intranet-sites&new=2928150%40ldap-login-for-intranet-sites&sfp_email=&sfph_mail=

Credits

Luca Greeb Andreas Krüger