Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23855 | The Custom Post Type UI WordPress plugin before 1.13.5 does not properly check for CSRF when sending the debug information to a user supplied email, which could allow attackers to make a logged in admin send such information to an arbitrary email address via a CSRF attack. |
Wed, 05 Feb 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-02-04T16:11:33.292Z
Reserved: 2023-03-24T15:26:34.005Z
Link: CVE-2023-1623
Updated: 2024-08-02T05:57:24.447Z
Status : Modified
Published: 2023-04-24T19:15:09.627
Modified: 2025-02-04T17:15:10.553
Link: CVE-2023-1623
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD