Critical severity9.8NVD Advisory· Published May 31, 2023· Updated Apr 8, 2026
CVE-2023-2987
CVE-2023-2987
Description
The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/wordapp/trunk/includes/access.phpnvdPatch
- plugins.trac.wordpress.org/browser/wordapp/trunk/includes/config.phpnvdPatch
- plugins.trac.wordpress.org/browser/wordapp/trunk/includes/pdx.phpnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9dnvdThird Party Advisory
- lana.report/publication/6e779e9a-e0f9-4102-9f0b-ad46e9c4533f/nvd
- plugins.trac.wordpress.org/changeset/3063322/wordappnvd
News mentions
0No linked articles in our index yet.