CVE-2023-30873

5.4 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WP Docs WordPress plugin that allows attackers to bypass access controls and access restricted content or functionality. All WordPress sites running WP Docs versions up to 1.9.8 are affected. The vulnerability stems from improper access control configuration that fails to verify user permissions.

💻 Affected Systems

Products:
  • WP Docs WordPress Plugin
Versions: All versions up to and including 1.9.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the WP Docs plugin enabled are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could access sensitive documents, modify content, or perform administrative actions depending on the plugin's functionality and configuration.

🟠

Likely Case

Attackers could view or download restricted documents that should only be accessible to authorized users, potentially exposing confidential information.

🟢

If Mitigated

With proper access controls and authentication mechanisms, the impact would be limited to attempted unauthorized access that gets blocked.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and this vulnerability could be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but the attack surface is smaller than internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.9 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-docs/vulnerability/wordpress-wp-docs-plugin-1-9-8-broken-access-control?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Docs plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.9.9+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable WP Docs Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wp-docs

Restrict Access via .htaccess

linux

Add access restrictions to WP Docs plugin directories

# Add to .htaccess in wp-content/plugins/wp-docs/
Order Deny,Allow
Deny from all
Allow from 127.0.0.1

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block suspicious access patterns to WP Docs endpoints
  • Enable detailed logging and monitoring for unauthorized access attempts to document-related functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → WP Docs version. If version is 1.9.8 or lower, you are vulnerable.

Check Version:

wp plugin get wp-docs --field=version

Verify Fix Applied:

Verify WP Docs plugin version is 1.9.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts for document access
  • Unauthorized users accessing /wp-content/plugins/wp-docs/ paths
  • Suspicious GET/POST requests to WP Docs endpoints

Network Indicators:

  • Unusual traffic patterns to WP Docs plugin URLs from unauthorized IPs
  • Requests bypassing normal authentication flows

SIEM Query:

source="wordpress.log" AND ("wp-docs" OR "wp-content/plugins/wp-docs") AND (response_code=200 OR response_code=403) AND user="unauthenticated"

🔗 References

📤 Share & Export