CVE-2023-38483
Instant CSS <= 1.1.4 - Missing Authorization via AJAX Actions
mediumMissing Authorization
5.3
CVSS Score
5.3
CVSS Score
medium
Severity
1.1.5
Patched in
183d
Time to patch
Description
The Instant CSS plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on several functions called via AJAX actions in the ~/classes/class.instantcss_ajax.php file in versions up to, and including, 1.1.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform a wide variety of actions such as retrieving css, theme, and minify data, along with updating the options for those. The unprotected AJAX actions present can be used to exploit a site via Cross-Site Scripting as well.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=1.1.4PublishedJuly 24, 2023
Last updatedJanuary 22, 2024
Affected plugininstant-css
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.