A Broken Access Control vulnerability has been identified in the WordPress BetterLinks Plugin. This vulnerability could allow an unprivileged user to execute a certain higher privileged action.
This vulnerability was discovered and responsibly reported by Nguyen Anh Tien.
The vulnerability is a Broken Access Control vulnerability that occurs in the betterlinks.php file. The vulnerability allows an attacker to exploit a flaw in the way that the plugin handles user permissions to gain access to sensitive information or functionality that they would not normally have access to.
Severity:
The vulnerability has a CVSS 3.1 score of 7.3, which is considered to be high. This means that the vulnerability is likely to be exploited and could have a significant impact on the affected system.
Affected Versions:
All versions of the BetterLinks Plugin prior to 1.6.1 are affected by this vulnerability.
Impact:
An attacker who successfully exploits this vulnerability could:
- Gain access to sensitive information or functionality that they would not normally have access to.
- Modify or delete data.
- Take control of user accounts.
Recommendation:
Users of the BetterLinks Plugin are strongly advised to update to the latest available version (at least 1.6.1) as soon as possible. This vulnerability has been fixed in version 1.6.1.