CVE-2023-4023: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown All Users Messenger
The All Users Messenger WordPress plugin through 1.24 does not prevent non-administrator users from deleting messages from the all-users messenger.
AI Analysis
Technical Summary
CVE-2023-4023 is a medium-severity authorization bypass vulnerability affecting the WordPress plugin 'All Users Messenger' up to version 1.24. The vulnerability arises because the plugin does not properly restrict message deletion functionality to administrators only. Specifically, non-administrator users are able to delete messages from the all-users messenger, which should normally be restricted to privileged users. This is classified under CWE-639, which involves authorization bypass through user-controlled keys or parameters. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a network attack vector with low attack complexity, requiring low privileges (non-admin user), no user interaction, and impacting integrity only (message deletion). There is no indication of known exploits in the wild, and no patches or vendor advisories have been linked yet. The plugin is used within WordPress environments to facilitate messaging among users, and improper access control can lead to unauthorized message deletion, potentially disrupting communication or causing loss of important information within the platform.
Potential Impact
For European organizations using WordPress sites with the All Users Messenger plugin, this vulnerability could lead to unauthorized deletion of messages by non-administrative users. While this does not directly compromise confidentiality or availability, it impacts data integrity and trustworthiness of communication channels. In environments where message logs are critical for compliance, auditing, or operational coordination, such unauthorized deletions could cause operational disruptions or compliance issues. Organizations relying on this plugin for internal or customer communications may face challenges in message traceability and accountability. Although the vulnerability does not allow for privilege escalation or remote code execution, the ability for lower-privileged users to delete messages could be exploited for sabotage, harassment, or to cover malicious activities. This risk is particularly relevant for organizations with multiple user roles and collaborative workflows on WordPress platforms.
Mitigation Recommendations
European organizations should first identify if they are using the All Users Messenger plugin on their WordPress sites. Since no official patch is currently linked, immediate mitigation steps include restricting plugin usage to trusted users only and limiting user roles that have access to the messenger functionality. Administrators should review and tighten WordPress user role permissions to ensure that only trusted users have message deletion capabilities. Monitoring and logging message deletion activities can help detect unauthorized actions. If possible, temporarily disabling the plugin until a patch or update is released is advisable. Organizations should also follow WPScan and other vulnerability databases for updates or patches. Implementing a Web Application Firewall (WAF) with custom rules to detect and block unauthorized deletion requests could provide additional protection. Finally, educating users about the risk and encouraging reporting of suspicious message deletions can help mitigate impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-4023: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown All Users Messenger
Description
The All Users Messenger WordPress plugin through 1.24 does not prevent non-administrator users from deleting messages from the all-users messenger.
AI-Powered Analysis
Technical Analysis
CVE-2023-4023 is a medium-severity authorization bypass vulnerability affecting the WordPress plugin 'All Users Messenger' up to version 1.24. The vulnerability arises because the plugin does not properly restrict message deletion functionality to administrators only. Specifically, non-administrator users are able to delete messages from the all-users messenger, which should normally be restricted to privileged users. This is classified under CWE-639, which involves authorization bypass through user-controlled keys or parameters. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a network attack vector with low attack complexity, requiring low privileges (non-admin user), no user interaction, and impacting integrity only (message deletion). There is no indication of known exploits in the wild, and no patches or vendor advisories have been linked yet. The plugin is used within WordPress environments to facilitate messaging among users, and improper access control can lead to unauthorized message deletion, potentially disrupting communication or causing loss of important information within the platform.
Potential Impact
For European organizations using WordPress sites with the All Users Messenger plugin, this vulnerability could lead to unauthorized deletion of messages by non-administrative users. While this does not directly compromise confidentiality or availability, it impacts data integrity and trustworthiness of communication channels. In environments where message logs are critical for compliance, auditing, or operational coordination, such unauthorized deletions could cause operational disruptions or compliance issues. Organizations relying on this plugin for internal or customer communications may face challenges in message traceability and accountability. Although the vulnerability does not allow for privilege escalation or remote code execution, the ability for lower-privileged users to delete messages could be exploited for sabotage, harassment, or to cover malicious activities. This risk is particularly relevant for organizations with multiple user roles and collaborative workflows on WordPress platforms.
Mitigation Recommendations
European organizations should first identify if they are using the All Users Messenger plugin on their WordPress sites. Since no official patch is currently linked, immediate mitigation steps include restricting plugin usage to trusted users only and limiting user roles that have access to the messenger functionality. Administrators should review and tighten WordPress user role permissions to ensure that only trusted users have message deletion capabilities. Monitoring and logging message deletion activities can help detect unauthorized actions. If possible, temporarily disabling the plugin until a patch or update is released is advisable. Organizations should also follow WPScan and other vulnerability databases for updates or patches. Implementing a Web Application Firewall (WAF) with custom rules to detect and block unauthorized deletion requests could provide additional protection. Finally, educating users about the risk and encouraging reporting of suspicious message deletions can help mitigate impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-07-31T15:44:17.837Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc83f
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:55:40 AM
Last updated: 12/4/2025, 8:43:55 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13543: CWE-434 Unrestricted Upload of File with Dangerous Type in rtowebsites PostGallery
HighCVE-2025-12997: CWE-639 Authorization Bypass Through User-Controlled Key in Medtronic CareLink Network
LowCVE-2025-12996: CWE-532 Insertion of Sensitive Information into Log File in Medtronic CareLink Network
MediumCVE-2025-12995: CWE-307 Improper Restriction of Excessive Authentication Attempts in Medtronic CareLink Network
HighCVE-2025-12994: CWE-204 Observable Response Discrepancy in Medtronic CareLink Network
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.