CVE-2023-6369: CWE-862 Missing Authorization in recorp Export WP Page to Static HTML/CSS
The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.
AI Analysis
Technical Summary
CVE-2023-6369 is a medium-severity vulnerability affecting the WordPress plugin 'Export WP Page to Static HTML/CSS' developed by recorp. The vulnerability arises from a missing authorization check (CWE-862) on multiple AJAX actions within the plugin, present in all versions up to and including 2.1.9. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing access to certain AJAX endpoints. This flaw enables any authenticated user with subscriber-level privileges or higher to perform unauthorized actions such as disclosing sensitive information or modifying advanced plugin settings. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and no UI is required (UI:N). The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact without affecting availability. Exploitation could lead to leakage of sensitive data managed by the plugin or unauthorized configuration changes that may weaken the security posture of the affected WordPress site. No known exploits are reported in the wild as of the publication date (January 11, 2024).
Potential Impact
For European organizations using WordPress websites with the 'Export WP Page to Static HTML/CSS' plugin, this vulnerability poses a moderate risk. Unauthorized disclosure of sensitive data could include configuration details or other information stored or processed by the plugin, potentially aiding further attacks. Modification of plugin settings by low-privileged users could lead to misconfigurations that degrade security or operational integrity. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, exploitation could undermine trust, cause data leaks, or disrupt website functionality. Organizations with subscriber-level user roles on their WordPress sites are particularly at risk, as these users could leverage the vulnerability to escalate privileges or extract sensitive information. The impact is more pronounced for sites handling personal data subject to GDPR, as unauthorized data exposure could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the 'Export WP Page to Static HTML/CSS' plugin to a patched version once available. In the absence of an official patch, administrators should restrict subscriber-level user capabilities or remove unnecessary user accounts with such privileges. Implementing strict role-based access control (RBAC) and auditing user permissions can reduce the attack surface. Additionally, monitoring AJAX requests to detect anomalous or unauthorized access attempts targeting the plugin's endpoints can help identify exploitation attempts. Web application firewalls (WAFs) can be configured to block suspicious AJAX calls or limit access to authenticated users with verified roles. Regular security assessments and plugin audits should be conducted to ensure no other missing authorization issues exist. Finally, organizations should maintain comprehensive logging to facilitate incident response if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6369: CWE-862 Missing Authorization in recorp Export WP Page to Static HTML/CSS
Description
The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.
AI-Powered Analysis
Technical Analysis
CVE-2023-6369 is a medium-severity vulnerability affecting the WordPress plugin 'Export WP Page to Static HTML/CSS' developed by recorp. The vulnerability arises from a missing authorization check (CWE-862) on multiple AJAX actions within the plugin, present in all versions up to and including 2.1.9. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing access to certain AJAX endpoints. This flaw enables any authenticated user with subscriber-level privileges or higher to perform unauthorized actions such as disclosing sensitive information or modifying advanced plugin settings. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and no UI is required (UI:N). The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact without affecting availability. Exploitation could lead to leakage of sensitive data managed by the plugin or unauthorized configuration changes that may weaken the security posture of the affected WordPress site. No known exploits are reported in the wild as of the publication date (January 11, 2024).
Potential Impact
For European organizations using WordPress websites with the 'Export WP Page to Static HTML/CSS' plugin, this vulnerability poses a moderate risk. Unauthorized disclosure of sensitive data could include configuration details or other information stored or processed by the plugin, potentially aiding further attacks. Modification of plugin settings by low-privileged users could lead to misconfigurations that degrade security or operational integrity. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, exploitation could undermine trust, cause data leaks, or disrupt website functionality. Organizations with subscriber-level user roles on their WordPress sites are particularly at risk, as these users could leverage the vulnerability to escalate privileges or extract sensitive information. The impact is more pronounced for sites handling personal data subject to GDPR, as unauthorized data exposure could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the 'Export WP Page to Static HTML/CSS' plugin to a patched version once available. In the absence of an official patch, administrators should restrict subscriber-level user capabilities or remove unnecessary user accounts with such privileges. Implementing strict role-based access control (RBAC) and auditing user permissions can reduce the attack surface. Additionally, monitoring AJAX requests to detect anomalous or unauthorized access attempts targeting the plugin's endpoints can help identify exploitation attempts. Web application firewalls (WAFs) can be configured to block suspicious AJAX calls or limit access to authenticated users with verified roles. Regular security assessments and plugin audits should be conducted to ensure no other missing authorization issues exist. Finally, organizations should maintain comprehensive logging to facilitate incident response if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-11-28T16:49:15.827Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e6634
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 4:25:00 PM
Last updated: 7/27/2025, 11:42:36 AM
Views: 12
Related Threats
CVE-2025-8742: Improper Restriction of Excessive Authentication Attempts in macrozheng mall
MediumCVE-2025-8741: Cleartext Transmission of Sensitive Information in macrozheng mall
MediumCVE-2025-8740: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-8739: Cross-Site Request Forgery in zhenfeng13 My-Blog
MediumCVE-2025-8738: Information Disclosure in zlt2000 microservices-platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.