CVE-2023-6600

The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.
Configurations

Configuration 1 (hide)

cpe:2.3:a:daan:omgf:*:*:*:*:*:wordpress:*:*

History

No history.

Information

Published : 2024-01-03 06:15

Updated : 2024-01-10 01:15


NVD link : CVE-2023-6600

Mitre link : CVE-2023-6600

CVE.ORG link : CVE-2023-6600


JSON object : View

Products Affected

daan

  • omgf
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')