CVE-2023-6369: CWE-862 Missing Authorization in recorp Export WP Page to Static HTML/CSS
The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.
AI Analysis
Technical Summary
CVE-2023-6369 is a medium-severity vulnerability affecting the WordPress plugin 'Export WP Page to Static HTML/CSS' developed by recorp. The vulnerability arises from a missing authorization check (CWE-862) on multiple AJAX actions within the plugin, present in all versions up to and including 2.1.9. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing access to certain AJAX endpoints. This flaw enables any authenticated user with subscriber-level privileges or higher to perform unauthorized actions such as disclosing sensitive information or modifying advanced plugin settings. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and no UI is required (UI:N). The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact without affecting availability. Exploitation could lead to leakage of sensitive data managed by the plugin or unauthorized configuration changes that may weaken the security posture of the affected WordPress site. No known exploits are reported in the wild as of the publication date (January 11, 2024).
Potential Impact
For European organizations using WordPress websites with the 'Export WP Page to Static HTML/CSS' plugin, this vulnerability poses a moderate risk. Unauthorized disclosure of sensitive data could include configuration details or other information stored or processed by the plugin, potentially aiding further attacks. Modification of plugin settings by low-privileged users could lead to misconfigurations that degrade security or operational integrity. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, exploitation could undermine trust, cause data leaks, or disrupt website functionality. Organizations with subscriber-level user roles on their WordPress sites are particularly at risk, as these users could leverage the vulnerability to escalate privileges or extract sensitive information. The impact is more pronounced for sites handling personal data subject to GDPR, as unauthorized data exposure could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the 'Export WP Page to Static HTML/CSS' plugin to a patched version once available. In the absence of an official patch, administrators should restrict subscriber-level user capabilities or remove unnecessary user accounts with such privileges. Implementing strict role-based access control (RBAC) and auditing user permissions can reduce the attack surface. Additionally, monitoring AJAX requests to detect anomalous or unauthorized access attempts targeting the plugin's endpoints can help identify exploitation attempts. Web application firewalls (WAFs) can be configured to block suspicious AJAX calls or limit access to authenticated users with verified roles. Regular security assessments and plugin audits should be conducted to ensure no other missing authorization issues exist. Finally, organizations should maintain comprehensive logging to facilitate incident response if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6369: CWE-862 Missing Authorization in recorp Export WP Page to Static HTML/CSS
Description
The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.
AI-Powered Analysis
Technical Analysis
CVE-2023-6369 is a medium-severity vulnerability affecting the WordPress plugin 'Export WP Page to Static HTML/CSS' developed by recorp. The vulnerability arises from a missing authorization check (CWE-862) on multiple AJAX actions within the plugin, present in all versions up to and including 2.1.9. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing access to certain AJAX endpoints. This flaw enables any authenticated user with subscriber-level privileges or higher to perform unauthorized actions such as disclosing sensitive information or modifying advanced plugin settings. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and no UI is required (UI:N). The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact without affecting availability. Exploitation could lead to leakage of sensitive data managed by the plugin or unauthorized configuration changes that may weaken the security posture of the affected WordPress site. No known exploits are reported in the wild as of the publication date (January 11, 2024).
Potential Impact
For European organizations using WordPress websites with the 'Export WP Page to Static HTML/CSS' plugin, this vulnerability poses a moderate risk. Unauthorized disclosure of sensitive data could include configuration details or other information stored or processed by the plugin, potentially aiding further attacks. Modification of plugin settings by low-privileged users could lead to misconfigurations that degrade security or operational integrity. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, exploitation could undermine trust, cause data leaks, or disrupt website functionality. Organizations with subscriber-level user roles on their WordPress sites are particularly at risk, as these users could leverage the vulnerability to escalate privileges or extract sensitive information. The impact is more pronounced for sites handling personal data subject to GDPR, as unauthorized data exposure could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the 'Export WP Page to Static HTML/CSS' plugin to a patched version once available. In the absence of an official patch, administrators should restrict subscriber-level user capabilities or remove unnecessary user accounts with such privileges. Implementing strict role-based access control (RBAC) and auditing user permissions can reduce the attack surface. Additionally, monitoring AJAX requests to detect anomalous or unauthorized access attempts targeting the plugin's endpoints can help identify exploitation attempts. Web application firewalls (WAFs) can be configured to block suspicious AJAX calls or limit access to authenticated users with verified roles. Regular security assessments and plugin audits should be conducted to ensure no other missing authorization issues exist. Finally, organizations should maintain comprehensive logging to facilitate incident response if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-11-28T16:49:15.827Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e6634
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 4:25:00 PM
Last updated: 9/16/2025, 9:46:47 AM
Views: 20
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.