The Fatal Error Notify WordPress plugin before 1.5.3 does not have authorisation and CSRF checks in its test_error AJAX action, allowing any authenticated users, such as subscriber to call it and spam the admin email address with error messages. The issue is also exploitable via CSRF
References
| Link | Resource |
|---|---|
| https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65b375a/ | Exploit Third Party Advisory |
| https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65b375a/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-27 09:15
Updated : 2025-05-01 14:31
NVD link : CVE-2023-7202
Mitre link : CVE-2023-7202
CVE.ORG link : CVE-2023-7202
JSON object : View
Products Affected
verygoodplugins
- fatal_error_notify
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
