

Rewterz Threat Advisory – Update On Urgent Patching Required As Critical Exploits Targeting Zyxel Firewalls
June 6, 2023
Rewterz Threat Update – Threat Actors Associated With The Cyclops Ransomware Offering An Information Stealer Malware To Cybercriminals
June 6, 2023
Rewterz Threat Advisory – Update On Urgent Patching Required As Critical Exploits Targeting Zyxel Firewalls
June 6, 2023
Rewterz Threat Update – Threat Actors Associated With The Cyclops Ransomware Offering An Information Stealer Malware To Cybercriminals
June 6, 2023Severity
Medium
Analysis Summary
Multiple vulnerabilities have been discovered in WordPress, specifically CVE-2023-3053, CVE-2023-3051, CVE-2023-3052, and CVE-2023-3055. These vulnerabilities can potentially leave websites and their users at risk of cyber attacks.
- CVE-2023-3053 CVSS:6.3
Page Builder by AZEXO Plugin for WordPress could allow a remote attacker to bypass security restrictions, caused by a missing capability check on the ‘azh_add_post’ function. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions to access to create a post with any post type and post status.
- CVE-2023-3051 CVSS:6.4
Page Builder by AZEXO Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability using the ‘azh_post’ shortcode to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
- CVE-2023-3052 CVSS:6.3
Page Builder by AZEXO Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the ‘azh_add_post’, ‘azh_duplicate_post’, ‘azh_update_post’ and ‘azh_remove_post’ functions. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to create, modify, and delete a post. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
- CVE-2023-3055 CVSS:6.1
Page Builder by AZEXO Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by the ‘azh_save’ function. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
As of the latest update, this plugin has been closed as of June 2, 2023 and is not available for download. This closure is temporary, according to the official statement from WordPress. It is important for website owners and administrators using the affected plugin to be aware of this vulnerability and take appropriate actions to mitigate the risk.
Impact
- Security Bypass
- Cross-Site Scripting
- Gain Access
Indicators Of Compromise
CVE
- CVE-2023-3053
- CVE-2023-3051
- CVE-2023-3052
- CVE-2023-3055
Affected Vendors
WordPress
Affected Products
- RapidExpCart Plugin for WordPress 1.0
- Page Builder by AZEXO plugin for WordPress 1.27.133
Remediation
As of the most latest versions, there are no patches or official fixes available from the plugin developer to address these issues. The plugin has been closed as of June 2, 2023 and is not available for download.
In the meantime, it is recommended to consider the following measures:
- Regularly monitor for updates and security advisories from the plugin developer.
- Implement strong access controls and user permissions to limit unauthorized access.
- Utilize additional security measures such as web application firewalls (WAF) to detect and prevent potential attacks.
- It is crucial to stay informed about the latest developments regarding this vulnerability and to follow best practices for securing WordPress websites.