CVE-2023-47762

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the WordPress BetterDocs plugin that allows attackers to bypass intended access controls. Attackers can exploit incorrectly configured security levels to perform unauthorized actions. All WordPress sites running BetterDocs versions up to 2.5.2 are affected.

💻 Affected Systems

Products:
  • WordPress BetterDocs Plugin
Versions: n/a through 2.5.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable BetterDocs plugin versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the WordPress site through privilege escalation, allowing attackers to modify content, install malicious plugins, or gain administrative access.

🟠

Likely Case

Unauthorized access to restricted documentation areas, modification of knowledge base content, or data exfiltration from protected sections.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authentication layers preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but can be automated once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/betterdocs/vulnerability/wordpress-betterdocs-plugin-2-5-2-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find BetterDocs plugin
4. Click 'Update Now' if update is available
5. If no update appears, manually download version 2.5.3+ from WordPress repository
6. Deactivate, delete old version, and upload new version
7. Reactivate plugin

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the BetterDocs plugin until patched version can be installed

wp plugin deactivate betterdocs

Access Restriction via .htaccess

linux

Add IP-based restrictions to WordPress admin and plugin directories

Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Add additional authentication layer (2FA) for all WordPress administrator accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → BetterDocs → Version number. If version is 2.5.2 or earlier, system is vulnerable.

Check Version:

wp plugin get betterdocs --field=version

Verify Fix Applied:

Verify BetterDocs plugin version is 2.5.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to BetterDocs endpoints
  • Multiple failed authentication attempts followed by successful access to restricted areas
  • Unusual user activity from non-admin accounts in documentation sections

Network Indicators:

  • HTTP requests to BetterDocs API endpoints from unauthorized IPs
  • Unusual traffic patterns to /wp-content/plugins/betterdocs/ directories

SIEM Query:

source="wordpress.log" AND ("betterdocs" OR "wp-betterdocs") AND (response_code=200 OR response_code=302) AND user_role!="administrator"

🔗 References

📤 Share & Export