CRITICALCVE-2023-4404CVSS 9.8

The Donation Forms by Charitable plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.7.0.12 due to insufficient restriction on the 'update_core_user' functio

翻訳中…

プラットフォーム

wordpress

コンポーネント

charitable

修正版

1.7.1

AI Confidence: highNVDEPSS 0.2%レビュー済み: 2026年5月
あなたの言語に翻訳中…

CVE-2023-4404 represents a critical privilege escalation vulnerability discovered in the Donation Forms by Charitable plugin for WordPress. This flaw allows unauthenticated attackers to manipulate user roles during registration, potentially gaining unauthorized access and control. The vulnerability affects versions up to and including 1.7.0.12. A patch has been released to address this issue.

WordPress

このCVEがあなたのプロジェクトに影響するか確認

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。

影響と攻撃シナリオ翻訳中…

The impact of CVE-2023-4404 is significant due to its ease of exploitation and the potential for widespread compromise. An unauthenticated attacker can leverage this vulnerability to assign themselves an administrator role or other privileged roles during the user registration process. This grants them full control over the WordPress site, enabling them to modify content, install malicious plugins, access sensitive data, and potentially compromise the entire system. The lack of authentication required for exploitation significantly broadens the attack surface, making many WordPress sites vulnerable. This vulnerability shares similarities with other privilege escalation flaws where improper role assignment can lead to unauthorized access.

悪用の状況翻訳中…

CVE-2023-4404 was publicly disclosed on August 23, 2023. While no active exploitation campaigns have been definitively confirmed, the ease of exploitation and the criticality of the vulnerability suggest a high probability of exploitation. Public proof-of-concept code is likely to emerge, increasing the risk. The vulnerability is tracked by CISA and is considered a high-priority issue.

リスク対象者翻訳中…

WordPress sites utilizing the Donation Forms by Charitable plugin, particularly those running versions prior to 1.7.0.12, are at significant risk. Shared hosting environments where multiple WordPress sites share the same server infrastructure are especially vulnerable, as a compromise of one site could potentially lead to lateral movement and compromise of others. Sites with weak user registration security practices are also at increased risk.

検出手順翻訳中…

• wordpress / composer / npm:

wp plugin list | grep Charitable

• wordpress / composer / npm:

wp plugin update --all

• wordpress / composer / npm:

grep -r 'update_core_user' /var/www/html/wp-content/plugins/charitable/

• wordpress / composer / npm:

curl -I https://your-wordpress-site.com/wp-admin/admin-ajax.php?action=charitable_register_user&role=administrator | head -n 1

攻撃タイムライン

  1. Disclosure

    disclosure

脅威インテリジェンス

エクスプロイト状況

概念実証不明
CISA KEVNO
インターネット露出

EPSS

0.24% (47% パーセンタイル)

CVSS ベクトル

脅威インテリジェンス· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻撃者がターゲットに到達する方法Attack ComplexityLow悪用に必要な条件Privileges RequiredNone攻撃に必要な認証レベルUser InteractionNone被害者の操作が必要かどうかScopeUnchanged影響コンポーネント外への波及ConfidentialityHigh機密データ漏洩のリスクIntegrityHigh不正データ改ざんのリスクAvailabilityHighサービス障害のリスクnextguardhq.com · CVSS v3.1 基本スコア
これらのメトリクスの意味は?
Attack Vector
ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
Attack Complexity
低 — 特別な条件不要。安定して悪用可能。
Privileges Required
なし — 認証不要。資格情報なしで悪用可能。
User Interaction
なし — 自動かつ無音の攻撃。被害者は何もしない。
Scope
変化なし — 影響は脆弱なコンポーネントのみ。
Confidentiality
高 — 機密性の完全喪失。全データが読み取り可能。
Integrity
高 — 任意のデータの書き込み・変更・削除が可能。
Availability
高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。

影響を受けるソフトウェア

コンポーネントcharitable
ベンダーsmub
影響範囲修正版
* – 1.7.0.121.7.1

パッケージ情報

アクティブインストール数
10K人気
プラグイン評価
4.9
WordPressが必要
5.0+
動作確認済みバージョン
7.0
PHPが必要
7.4+

弱点分類 (CWE)

タイムライン

  1. 予約済み
  2. 公開日
  3. 更新日
  4. EPSS 更新日
未パッチ — 公開から1005日経過

緩和策と回避策翻訳中…

The primary mitigation for CVE-2023-4404 is to immediately upgrade the Donation Forms by Charitable plugin to the latest available version, which contains the necessary fix. If upgrading is not immediately feasible due to compatibility concerns or breaking changes, consider temporarily disabling user registration on the WordPress site to prevent new accounts from being exploited. While not a complete solution, implementing strict user role validation and access controls within the WordPress configuration can help limit the potential damage if the vulnerability is exploited. Reviewing user roles and permissions regularly is also recommended.

修正方法翻訳中…

Actualice el plugin Donation Forms by Charitable a la última versión disponible. Esto corregirá la vulnerabilidad de escalada de privilegios permitiendo que solo usuarios autorizados modifiquen los roles de otros usuarios.

CVEセキュリティニュースレター

脆弱性分析と重要アラートをメールでお届けします。

よくある質問翻訳中…

What is CVE-2023-4404 — Privilege Escalation in Donation Forms by Charitable?

CVE-2023-4404 is a critical vulnerability in the Donation Forms by Charitable WordPress plugin allowing unauthenticated attackers to escalate privileges during user registration, potentially gaining admin access.

Am I affected by CVE-2023-4404 in Donation Forms by Charitable?

If you are using Donation Forms by Charitable plugin versions 1.7.0.12 or earlier, you are vulnerable to this privilege escalation flaw.

How do I fix CVE-2023-4404 in Donation Forms by Charitable?

Upgrade the Donation Forms by Charitable plugin to the latest version available. If upgrading is not possible immediately, disable user registration as a temporary workaround.

Is CVE-2023-4404 being actively exploited?

While no confirmed active exploitation campaigns are publicly known, the vulnerability's criticality and ease of exploitation suggest a high probability of exploitation.

Where can I find the official Donation Forms by Charitable advisory for CVE-2023-4404?

Refer to the official Donation Forms by Charitable plugin website or the WordPress plugin repository for the latest security advisory and update information.

あなたのプロジェクトは影響を受けていますか?

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。