The Clerk WordPress plugin before 4.0.0 is affected by time-based attacks in the validation function for all API requests due to the usage of comparison operators to verify API keys against the ones stored in the site options.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c - Exploit, Third Party Advisory |
07 Nov 2023, 03:51
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
21 Jul 2023, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-203 |
Information
Published : 2022-12-05 17:15
Updated : 2025-04-23 15:15
NVD link : CVE-2022-3907
Mitre link : CVE-2022-3907
CVE.ORG link : CVE-2022-3907
JSON object : View
Products Affected
clerk
- clerk.io
CWE
CWE-203
Observable Discrepancy
