Headline
CVE-2023-47757: WordPress AWeber plugin <= 7.3.9 - Broken Access Control vulnerability - Patchstack
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in AWeber AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth allows Accessing Functionality Not Properly Constrained by ACLs, Cross-Site Request Forgery.This issue affects AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth: from n/a through 7.3.9.
Solution
Fixed
Update the WordPress AWeber plugin to the latest available version (at least 7.3.10).
Found this useful? Thank Abdi Pranata for reporting this vulnerability. Buy a coffee ☕
Abdi Pranata discovered and reported this Broken Access Control vulnerability in WordPress AWeber Plugin. A broken access control issue refers to a missing authorization, authentication or nonce token check in a function that could lead to an unprivileged user to executing a certain higher privileged action. This vulnerability has been fixed in version 7.3.10.
No other known vulnerabilities for this pluginReport
WordPress plugin developer?
Start a free security program for your WordPress plugins or request an audit.
Apply for MVDP
Security researcher?
Report to Patchstack Alliance bounty platform and earn monthly cash prizes.
Learn more