CVE-2023-41654
High
|8.8No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to trick a user into performing actions on the authLdap plugin without their consent, potentially compromising user accounts. It requires the user to be logged in and to click on a malicious link or visit a malicious site while using the affected plugin version.
Technical Description
Cross-Site Request Forgery (CSRF) vulnerability in Andreas Heigl authLdap plugin <= 2.5.8 versions.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 882 days
Quick Information
Published
Oct 6, 2023
over 2 years ago
Last Modified
Mar 6, 2026
about 1 month ago
Vendor
heiglandreas
Product
authldap