CVE-2023-44150

7.5 HIGH

📋 TL;DR

This vulnerability in the ProfilePress WordPress plugin exposes sensitive information via debug logs to unauthorized actors. It affects all WordPress sites using ProfilePress versions up to 4.13.2, potentially revealing user data, configuration details, or other sensitive information stored in debug logs.

💻 Affected Systems

Products:
  • ProfilePress (WordPress plugin)
Versions: n/a through 4.13.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable ProfilePress plugin versions. Debug logging must be enabled for exposure to occur.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive user data (PII, credentials), configuration secrets, or other confidential information stored in debug logs, leading to data breaches, account compromise, or further attacks.

🟠

Likely Case

Unauthorized access to debug logs containing user information, configuration details, or error messages that reveal system information.

🟢

If Mitigated

Limited exposure of non-critical debug information or no access if debug logging is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves accessing debug log files that may be exposed through the plugin. No authentication required if logs are publicly accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.13.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-user-avatar/wordpress-profilepress-plugin-4-13-2-sensitive-data-exposure-via-debug-log-vulnerability

Restart Required: No

Instructions:

1. Update ProfilePress plugin to version 4.13.3 or later via WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find ProfilePress and click 'Update Now'. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable debug logging

all

Disable WordPress debug logging to prevent sensitive information from being written to logs.

Edit wp-config.php and set: define('WP_DEBUG', false); define('WP_DEBUG_LOG', false);

Restrict access to debug logs

linux

Configure web server to block access to debug log files.

For Apache: Add to .htaccess: <Files "debug.log"> Order Allow,Deny Deny from all </Files>
For Nginx: Add to server block: location ~* \.log$ { deny all; }

🧯 If You Can't Patch

  • Disable the ProfilePress plugin entirely until patched.
  • Implement strict access controls to prevent unauthorized access to debug log files.

🔍 How to Verify

Check if Vulnerable:

Check ProfilePress plugin version in WordPress admin panel under Plugins > Installed Plugins. If version is 4.13.2 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=profilepress --field=version

Verify Fix Applied:

Verify ProfilePress plugin version is 4.13.3 or later in WordPress admin panel. Test that debug logs no longer contain sensitive information.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to debug.log or similar log files
  • HTTP requests to log file paths

Network Indicators:

  • HTTP requests with patterns like '/wp-content/debug.log' or '/wp-content/uploads/profilepress/logs/'

SIEM Query:

web.url:*debug.log OR web.url:*profilepress*log*

🔗 References

📤 Share & Export