TLP : CLEAR
Date : 03/01/2024
REF NO : CERT /2024/01/01
Severity Level: High
Components Affected
OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. (version 5.7.9)
Overview
An unauthenticated Stored Cross-Site Scripting (XSS) and directory deletion vulnerability has been discovered in the “OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy.” plugin for WordPress, may allow unauthenticated attackers to update the plugin’s settings and inject malicious scripts into affected sites
Description
This vulnerability, identified as CVE-2023-6600 (CVSS score of 8.6). It could affect sites that have the OMGF plugin installed and configured, which is estimated to be over 300,000 site. The OMGF plugin vulnerability occurs due to a missing capability check on the update_settings() function hooked via admin_init.
Impact
This allows unauthenticated attackers to modify the plugin’s settings, leading to Stored Cross-Site Scripting and directory deletion.
Solution/ Workarounds
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre