🔐 CVE Alert

CVE-2023-47757

MEDIUM 4.3

WordPress AWeber Plugin <= 7.3.9 is vulnerable to Broken Access Control

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in AWeber AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth allows Accessing Functionality Not Properly Constrained by ACLs, Cross-Site Request Forgery.This issue affects AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth: from n/a through 7.3.9.

CWE CWE-862 CWE-352
Vendor aweber
Product aweber – free sign up form and landing page builder plugin for lead generation and email newsletter growth
Published Nov 17, 2023
Last Updated Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for aweber aweber – free sign up form and landing page builder plugin for lead generation and email newsletter growth

Be the first to know when new medium vulnerabilities affecting aweber aweber – free sign up form and landing page builder plugin for lead generation and email newsletter growth are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

AWeber / AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth
n/a ≤ 7.3.9

References

NVD ↗ CVE.org ↗ EPSS Data ↗
patchstack.com: https://patchstack.com/database/vulnerability/aweber-web-form-widget/wordpress-aweber-plugin-7-3-9-broken-access-control-vulnerability?_s_id=cve

Credits

Abdi Pranata (Patchstack Alliance)