CVE-2023-46073

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the DX Delete Attached Media WordPress plugin that allows attackers to exploit incorrectly configured access controls. Attackers can perform unauthorized actions due to broken access control, affecting all WordPress sites using vulnerable versions of this plugin.

💻 Affected Systems

Products:
  • DX Delete Attached Media WordPress Plugin
Versions: n/a through 2.0.5.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin version installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could delete media attachments from WordPress sites, potentially causing data loss, site functionality issues, or content manipulation.

🟠

Likely Case

Low-privileged users or attackers could delete media files they shouldn't have access to, disrupting site content and functionality.

🟢

If Mitigated

With proper user role management and access controls, impact would be limited to authorized users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but minimal technical skill due to missing authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.5.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/dx-delete-attached-media/vulnerability/wordpress-dx-delete-attached-media-plugin-2-0-5-1-broken-access-control-vulnerability-csrf?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'DX Delete Attached Media'
4. Click 'Update Now' if update available
5. If no update available, deactivate and delete plugin
6. Install latest version from WordPress repository

🔧 Temporary Workarounds

Deactivate Plugin

all

Temporarily disable the vulnerable plugin until patched version is available

wp plugin deactivate dx-delete-attached-media

Restrict User Roles

all

Limit user accounts with access to media management capabilities

🧯 If You Can't Patch

  • Deactivate the DX Delete Attached Media plugin immediately
  • Implement web application firewall rules to block suspicious media deletion requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → DX Delete Attached Media → Version number

Check Version:

wp plugin get dx-delete-attached-media --field=version

Verify Fix Applied:

Verify plugin version is 2.0.5.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized DELETE requests to media endpoints
  • Failed authorization attempts for media deletion

Network Indicators:

  • HTTP DELETE requests to /wp-admin/admin-ajax.php with delete_attachment action

SIEM Query:

source="wordpress.log" AND (action="delete_attachment" AND result="unauthorized")

🔗 References

📤 Share & Export