vulnerability
WordPress Plugin: host-webfonts-local: CVE-2023-6600: Missing Authorization
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:N/C:P/I:P/A:C) | Jan 2, 2024 | May 15, 2025 | May 15, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:C)
Published
Jan 2, 2024
Added
May 15, 2025
Modified
May 15, 2025
Description
The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.
Solution
host-webfonts-local-plugin-cve-2023-6600

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.