Vulnerability Details CVE-2023-37890
Missing Authorization vulnerability in WPOmnia KB Support – WordPress Help Desk and Knowledge Base allows Accessing Functionality Not Properly Constrained by ACLs. Users with a role as low as a subscriber can view other customers.This issue affects KB Support – WordPress Help Desk and Knowledge Base: from n/a through 1.5.88.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 49.2%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2023-37890
-
cpe:2.3:a:logon:kb_support:-
-
cpe:2.3:a:logon:kb_support:0.9
-
cpe:2.3:a:logon:kb_support:0.9.1
-
cpe:2.3:a:logon:kb_support:0.9.2
-
cpe:2.3:a:logon:kb_support:0.9.3
-
cpe:2.3:a:logon:kb_support:0.9.4
-
cpe:2.3:a:logon:kb_support:0.9.5
-
cpe:2.3:a:logon:kb_support:1.0
-
cpe:2.3:a:logon:kb_support:1.0.1
-
cpe:2.3:a:logon:kb_support:1.0.2
-
cpe:2.3:a:logon:kb_support:1.0.3
-
cpe:2.3:a:logon:kb_support:1.0.4
-
cpe:2.3:a:logon:kb_support:1.0.5
-
cpe:2.3:a:logon:kb_support:1.0.6
-
cpe:2.3:a:logon:kb_support:1.0.7
-
cpe:2.3:a:logon:kb_support:1.0.8
-
cpe:2.3:a:logon:kb_support:1.0.9
-
cpe:2.3:a:logon:kb_support:1.1
-
cpe:2.3:a:logon:kb_support:1.1.1
-
cpe:2.3:a:logon:kb_support:1.1.10
-
cpe:2.3:a:logon:kb_support:1.1.11
-
cpe:2.3:a:logon:kb_support:1.1.12
-
cpe:2.3:a:logon:kb_support:1.1.13
-
cpe:2.3:a:logon:kb_support:1.1.2
-
cpe:2.3:a:logon:kb_support:1.1.3
-
cpe:2.3:a:logon:kb_support:1.1.4
-
cpe:2.3:a:logon:kb_support:1.1.5
-
cpe:2.3:a:logon:kb_support:1.1.6
-
cpe:2.3:a:logon:kb_support:1.1.7
-
cpe:2.3:a:logon:kb_support:1.1.8
-
cpe:2.3:a:logon:kb_support:1.1.9
-
cpe:2.3:a:logon:kb_support:1.2
-
cpe:2.3:a:logon:kb_support:1.2.1
-
cpe:2.3:a:logon:kb_support:1.2.10
-
cpe:2.3:a:logon:kb_support:1.2.2
-
cpe:2.3:a:logon:kb_support:1.2.3
-
cpe:2.3:a:logon:kb_support:1.2.4
-
cpe:2.3:a:logon:kb_support:1.2.5
-
cpe:2.3:a:logon:kb_support:1.2.6
-
cpe:2.3:a:logon:kb_support:1.2.7
-
cpe:2.3:a:logon:kb_support:1.2.8
-
cpe:2.3:a:logon:kb_support:1.2.9
-
cpe:2.3:a:logon:kb_support:1.3
-
cpe:2.3:a:logon:kb_support:1.3.1
-
cpe:2.3:a:logon:kb_support:1.3.2
-
cpe:2.3:a:logon:kb_support:1.3.3
-
cpe:2.3:a:logon:kb_support:1.3.4
-
cpe:2.3:a:logon:kb_support:1.3.5
-
cpe:2.3:a:logon:kb_support:1.3.6
-
cpe:2.3:a:logon:kb_support:1.4
-
cpe:2.3:a:logon:kb_support:1.4.1
-
cpe:2.3:a:logon:kb_support:1.4.10
-
cpe:2.3:a:logon:kb_support:1.4.2
-
cpe:2.3:a:logon:kb_support:1.4.3
-
cpe:2.3:a:logon:kb_support:1.4.4
-
cpe:2.3:a:logon:kb_support:1.4.5
-
cpe:2.3:a:logon:kb_support:1.4.6
-
cpe:2.3:a:logon:kb_support:1.4.7
-
cpe:2.3:a:logon:kb_support:1.4.8
-
cpe:2.3:a:logon:kb_support:1.4.9
-
cpe:2.3:a:logon:kb_support:1.5
-
cpe:2.3:a:logon:kb_support:1.5.1
-
cpe:2.3:a:logon:kb_support:1.5.2
-
cpe:2.3:a:logon:kb_support:1.5.3
-
cpe:2.3:a:logon:kb_support:1.5.6
-
cpe:2.3:a:logon:kb_support:1.5.8
-
cpe:2.3:a:logon:kb_support:1.5.81
-
cpe:2.3:a:logon:kb_support:1.5.83
-
cpe:2.3:a:logon:kb_support:1.5.84
-
cpe:2.3:a:logon:kb_support:1.5.85
-
cpe:2.3:a:logon:kb_support:1.5.86
-
cpe:2.3:a:logon:kb_support:1.5.87
-
cpe:2.3:a:logon:kb_support:1.5.88