CVE-2023-2172

The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_update_steps_ajax_handler, badgeos_update_award_steps_ajax_handler, badgeos_update_deduct_steps_ajax_handler, and badgeos_update_ranks_req_steps_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to overwrite arbitrary post titles.
Configurations

Configuration 1 (hide)

cpe:2.3:a:badgeos:badgeos:*:*:*:*:*:wordpress:*:*

History

08 Apr 2026, 18:17

Type Values Removed Values Added
CWE CWE-639
Summary
  • (es) El plugin BadgeOS para WordPress es vulnerable a Referencia Directa Insegura a Objeto en versiones hasta la 3.7.1.6, inclusive. Esto se debe a validación y comprobaciones de autorización inadecuadas dentro de las funciones badgeos_update_steps_ajax_handler, badgeos_update_award_steps_ajax_handler, badgeos_update_deduct_steps_ajax_handler y badgeos_update_ranks_req_steps_ajax_handler. Esto hace posible que atacantes autenticados, con permisos de nivel de suscriptor y superiores, sobrescriban títulos de publicaciones arbitrarios.

21 Nov 2024, 07:58

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/award-steps-ui.php#L397 - Patch () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/award-steps-ui.php#L397 - Patch
References () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/deduct-steps-ui.php#L454 - Patch () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/deduct-steps-ui.php#L454 - Patch
References () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/ranks/rank-steps-ui.php#L388 - Patch () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/ranks/rank-steps-ui.php#L388 - Patch
References () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/steps-ui.php#L396 - Patch () https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/steps-ui.php#L396 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=cve - Third Party Advisory

07 Nov 2023, 04:12

Type Values Removed Values Added
CWE CWE-639

01 Sep 2023, 13:03

Type Values Removed Values Added
First Time Badgeos
Badgeos badgeos
References (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/steps-ui.php#L396 - (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/steps-ui.php#L396 - Patch
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=cve - Third Party Advisory
References (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/award-steps-ui.php#L397 - (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/award-steps-ui.php#L397 - Patch
References (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/deduct-steps-ui.php#L454 - (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/points/deduct-steps-ui.php#L454 - Patch
References (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/ranks/rank-steps-ui.php#L388 - (MISC) https://plugins.trac.wordpress.org/browser/badgeos/trunk/includes/ranks/rank-steps-ui.php#L388 - Patch
CPE cpe:2.3:a:badgeos:badgeos:*:*:*:*:*:wordpress:*:*

31 Aug 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-31 06:15

Updated : 2026-04-08 18:17


NVD link : CVE-2023-2172

Mitre link : CVE-2023-2172

CVE.ORG link : CVE-2023-2172


JSON object : View

Products Affected

badgeos

  • badgeos
CWE
CWE-639

Authorization Bypass Through User-Controlled Key