VYPR
Medium severity5.3NVD Advisory· Published Dec 9, 2024· Updated Apr 28, 2026

CVE-2023-49154

CVE-2023-49154

Description

Missing Authorization vulnerability in Wow-Company Button Generator – easily Button Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Button Generator – easily Button Builder: from n/a through 2.3.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Button Generator for WordPress <=2.3.8 has a missing authorization vulnerability allowing unauthenticated access to privileged actions.

Vulnerability

Analysis The Button Generator – easily Button Builder plugin for WordPress versions through 2.3.8 contains a missing authorization vulnerability [1]. This broken access control issue means the plugin fails to properly verify user permissions or nonce tokens before executing certain higher privileged functions [1]. The flaw exists in how the plugin handles access control, allowing incorrect configuration of security levels.

Exploitation

An attacker can exploit this vulnerability without needing authentication [1]. The attack surface is the WordPress admin interface where the plugin's functions are accessible. Since there is no proper authorization check, an unprivileged user or external attacker can trigger actions that should require higher privileges, such as modifying button configurations [1]. This type of vulnerability is commonly used in mass-exploit campaigns targeting thousands of websites [1].

Impact

Successful exploitation allows an attacker to perform actions intended only for authorized users, potentially modifying button settings, inserting malicious content, or altering site behavior [1]. The impact is considered low severity with a CVSS v3 score of 5.3, but it still poses a risk especially when combined with other vulnerabilities [1].

Mitigation

The vendor has released version 2.3.9 which resolves the issue [1]. Users are strongly advised to update immediately. If unable to update, users should consult their hosting provider or web developer for assistance [1]. Patchstack users can enable auto-updates for vulnerable plugins [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.