CVE-2023-6623

CVSS 3.1 Score 9.8 of 10 (high)

Details

Published Jan 15, 2024
Updated: Jan 19, 2024
CWE ID 22

Summary

CVE-2023-6623 is a vulnerability affecting the Essential Blocks WordPress plugin before version 4.4.3. This issue allows unauthenticated attackers to manipulate local variables during template rendering over the REST API. The consequence of this vulnerability is the potential for Local File Inclusion attacks, which could result in unauthorized access or data exposure. Attackers can exploit this flaw to include and execute malicious code, posing a significant security risk. WordPress users are advised to update the plugin to the latest version to mitigate this vulnerability.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6623 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions