CVE-2023-5576
Summary
| CVE | CVE-2023-5576 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-20 07:15:00 UTC |
| Updated | 2023-11-07 04:24:00 UTC |
| Description | The Migration, Backup, Staging - WPvivid plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 0.9.91 via Google Drive API secrets stored in plaintext in the publicly visible plugin source. This could allow unauthenticated attackers to impersonate the WPVivid Google Drive account via the API if they can trick a user into reauthenticating via another vulnerability or social engineering. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Wpvivid | Migration Backup Staging | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 403 Forbidden | MISC | plugins.trac.wordpress.org | |
| Migration, Backup, Staging – WPvivid <= 0.9.91 - Google Drive Client Secret Exposure | MISC | www.wordfence.com | |
| 403 Forbidden | MISC | plugins.trac.wordpress.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.