Vulnerability Details CVE-2023-5559
The 10Web Booster WordPress plugin before 2.24.18 does not validate the option name given to some AJAX actions, allowing unauthenticated users to delete arbitrary options from the database, leading to denial of service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 56.8%
CVSS Severity
CVSS v3 Score 9.1
Products affected by CVE-2023-5559
-
cpe:2.3:a:10web:10web_booster:2.0.10
-
cpe:2.3:a:10web:10web_booster:2.0.11
-
cpe:2.3:a:10web:10web_booster:2.0.12
-
cpe:2.3:a:10web:10web_booster:2.0.13
-
cpe:2.3:a:10web:10web_booster:2.0.14
-
cpe:2.3:a:10web:10web_booster:2.0.15
-
cpe:2.3:a:10web:10web_booster:2.0.16
-
cpe:2.3:a:10web:10web_booster:2.0.17
-
cpe:2.3:a:10web:10web_booster:2.0.18
-
cpe:2.3:a:10web:10web_booster:2.0.21
-
cpe:2.3:a:10web:10web_booster:2.0.22
-
cpe:2.3:a:10web:10web_booster:2.0.25
-
cpe:2.3:a:10web:10web_booster:2.0.26
-
cpe:2.3:a:10web:10web_booster:2.0.27
-
cpe:2.3:a:10web:10web_booster:2.0.3
-
cpe:2.3:a:10web:10web_booster:2.0.7
-
cpe:2.3:a:10web:10web_booster:2.0.9
-
cpe:2.3:a:10web:10web_booster:2.10.46
-
cpe:2.3:a:10web:10web_booster:2.10.65
-
cpe:2.3:a:10web:10web_booster:2.10.66
-
cpe:2.3:a:10web:10web_booster:2.10.68
-
cpe:2.3:a:10web:10web_booster:2.11.41
-
cpe:2.3:a:10web:10web_booster:2.11.42
-
cpe:2.3:a:10web:10web_booster:2.11.43
-
cpe:2.3:a:10web:10web_booster:2.12.15
-
cpe:2.3:a:10web:10web_booster:2.12.21
-
cpe:2.3:a:10web:10web_booster:2.12.22
-
cpe:2.3:a:10web:10web_booster:2.12.23
-
cpe:2.3:a:10web:10web_booster:2.12.26
-
cpe:2.3:a:10web:10web_booster:2.13.37
-
cpe:2.3:a:10web:10web_booster:2.13.40
-
cpe:2.3:a:10web:10web_booster:2.13.41
-
cpe:2.3:a:10web:10web_booster:2.13.42
-
cpe:2.3:a:10web:10web_booster:2.13.44
-
cpe:2.3:a:10web:10web_booster:2.13.45
-
cpe:2.3:a:10web:10web_booster:2.13.47
-
cpe:2.3:a:10web:10web_booster:2.14.49
-
cpe:2.3:a:10web:10web_booster:2.14.50
-
cpe:2.3:a:10web:10web_booster:2.15.18
-
cpe:2.3:a:10web:10web_booster:2.17.21
-
cpe:2.3:a:10web:10web_booster:2.17.23
-
cpe:2.3:a:10web:10web_booster:2.18.17
-
cpe:2.3:a:10web:10web_booster:2.19.44
-
cpe:2.3:a:10web:10web_booster:2.19.45
-
cpe:2.3:a:10web:10web_booster:2.19.46
-
cpe:2.3:a:10web:10web_booster:2.19.49
-
cpe:2.3:a:10web:10web_booster:2.2.12
-
cpe:2.3:a:10web:10web_booster:2.2.15
-
cpe:2.3:a:10web:10web_booster:2.2.16
-
cpe:2.3:a:10web:10web_booster:2.2.18
-
cpe:2.3:a:10web:10web_booster:2.2.8
-
cpe:2.3:a:10web:10web_booster:2.20.31
-
cpe:2.3:a:10web:10web_booster:2.20.32
-
cpe:2.3:a:10web:10web_booster:2.20.33
-
cpe:2.3:a:10web:10web_booster:2.21.11
-
cpe:2.3:a:10web:10web_booster:2.21.12
-
cpe:2.3:a:10web:10web_booster:2.21.16
-
cpe:2.3:a:10web:10web_booster:2.21.25
-
cpe:2.3:a:10web:10web_booster:2.22.29
-
cpe:2.3:a:10web:10web_booster:2.22.30
-
cpe:2.3:a:10web:10web_booster:2.22.31
-
cpe:2.3:a:10web:10web_booster:2.22.32
-
cpe:2.3:a:10web:10web_booster:2.23.12
-
cpe:2.3:a:10web:10web_booster:2.23.13
-
cpe:2.3:a:10web:10web_booster:2.23.14
-
cpe:2.3:a:10web:10web_booster:2.23.15
-
cpe:2.3:a:10web:10web_booster:2.23.16
-
cpe:2.3:a:10web:10web_booster:2.23.18
-
cpe:2.3:a:10web:10web_booster:2.24.12
-
cpe:2.3:a:10web:10web_booster:2.24.14
-
cpe:2.3:a:10web:10web_booster:2.3.0
-
cpe:2.3:a:10web:10web_booster:2.3.1
-
cpe:2.3:a:10web:10web_booster:2.3.2
-
cpe:2.3:a:10web:10web_booster:2.3.3
-
cpe:2.3:a:10web:10web_booster:2.6.30
-
cpe:2.3:a:10web:10web_booster:2.6.31
-
cpe:2.3:a:10web:10web_booster:2.6.37
-
cpe:2.3:a:10web:10web_booster:2.6.40
-
cpe:2.3:a:10web:10web_booster:2.6.42
-
cpe:2.3:a:10web:10web_booster:2.7.37
-
cpe:2.3:a:10web:10web_booster:2.7.44
-
cpe:2.3:a:10web:10web_booster:2.7.47
-
cpe:2.3:a:10web:10web_booster:2.8.18
-
cpe:2.3:a:10web:10web_booster:2.8.19
-
cpe:2.3:a:10web:10web_booster:2.8.32
-
cpe:2.3:a:10web:10web_booster:2.8.34
-
cpe:2.3:a:10web:10web_booster:2.8.35
-
cpe:2.3:a:10web:10web_booster:2.9.23
-
cpe:2.3:a:10web:10web_booster:2.9.24
-
cpe:2.3:a:10web:10web_booster:2.9.25
-
cpe:2.3:a:10web:10web_booster:2.9.27