Vulnerability identifier: #VU82206
Vulnerability risk: Low
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-3707
CWE-ID:
CWE-639
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
ActivityPub
Web applications /
Modules and components for CMS
Vendor: Matthias Pfefferle
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to the affected plugin does not ensure that post contents to be displayed are public and belong to the plugin. A remote user can retrieve the content of arbitrary post via an IDOR vector
Mitigation
Install updates from vendor's website.
Vulnerable software versions
ActivityPub: 0.0.1 - 0.17.0
External links
https://wpscan.com/vulnerability/541bbe4c-3295-4073-901d-763556269f48
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.