Skip to main content

CVE-2023-6369: CWE-862 Missing Authorization in recorp Export WP Page to Static HTML/CSS

Medium
VulnerabilityCVE-2023-6369cvecve-2023-6369cwe-862
Published: Thu Jan 11 2024 (01/11/2024, 08:32:33 UTC)
Source: CVE Database V5
Vendor/Project: recorp
Product: Export WP Page to Static HTML/CSS

Description

The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:25:00 UTC

Technical Analysis

CVE-2023-6369 is a medium-severity vulnerability affecting the WordPress plugin 'Export WP Page to Static HTML/CSS' developed by recorp. The vulnerability arises from a missing authorization check (CWE-862) on multiple AJAX actions within the plugin, present in all versions up to and including 2.1.9. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing access to certain AJAX endpoints. This flaw enables any authenticated user with subscriber-level privileges or higher to perform unauthorized actions such as disclosing sensitive information or modifying advanced plugin settings. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and no UI is required (UI:N). The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact without affecting availability. Exploitation could lead to leakage of sensitive data managed by the plugin or unauthorized configuration changes that may weaken the security posture of the affected WordPress site. No known exploits are reported in the wild as of the publication date (January 11, 2024).

Potential Impact

For European organizations using WordPress websites with the 'Export WP Page to Static HTML/CSS' plugin, this vulnerability poses a moderate risk. Unauthorized disclosure of sensitive data could include configuration details or other information stored or processed by the plugin, potentially aiding further attacks. Modification of plugin settings by low-privileged users could lead to misconfigurations that degrade security or operational integrity. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, exploitation could undermine trust, cause data leaks, or disrupt website functionality. Organizations with subscriber-level user roles on their WordPress sites are particularly at risk, as these users could leverage the vulnerability to escalate privileges or extract sensitive information. The impact is more pronounced for sites handling personal data subject to GDPR, as unauthorized data exposure could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately update the 'Export WP Page to Static HTML/CSS' plugin to a patched version once available. In the absence of an official patch, administrators should restrict subscriber-level user capabilities or remove unnecessary user accounts with such privileges. Implementing strict role-based access control (RBAC) and auditing user permissions can reduce the attack surface. Additionally, monitoring AJAX requests to detect anomalous or unauthorized access attempts targeting the plugin's endpoints can help identify exploitation attempts. Web application firewalls (WAFs) can be configured to block suspicious AJAX calls or limit access to authenticated users with verified roles. Regular security assessments and plugin audits should be conducted to ensure no other missing authorization issues exist. Finally, organizations should maintain comprehensive logging to facilitate incident response if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-11-28T16:49:15.827Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034a182aa0cae27e6634

Added to database: 6/3/2025, 2:14:34 PM

Last enriched: 7/4/2025, 4:25:00 PM

Last updated: 7/27/2025, 11:42:36 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats