CVE-2023-6250

7.5 HIGH

📋 TL;DR

The BestWebSoft Like & Share WordPress plugin before version 2.74 exposes password-protected post content to unauthenticated users through meta tags. This vulnerability allows anyone to read content that should be restricted, affecting all WordPress sites using vulnerable versions of this plugin.

💻 Affected Systems

Products:
  • BestWebSoft Like & Share WordPress Plugin
Versions: All versions before 2.74
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites using the vulnerable plugin version with password-protected posts.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive password-protected content (private announcements, internal documents, confidential information) becomes publicly accessible to any website visitor.

🟠

Likely Case

Unauthorized users can read password-protected posts, compromising content privacy and potentially exposing sensitive information.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential privacy violations of specific protected content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and can be performed by simply viewing page source or using automated tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.74

Vendor Advisory: https://wordpress.org/plugins/bws-like/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Like & Share by BestWebSoft'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.74+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate bws-like

Remove Password-Protected Posts

all

Temporarily remove or change protection method for sensitive posts.

🧯 If You Can't Patch

  • Implement web application firewall rules to block access to vulnerable plugin endpoints
  • Monitor access logs for unusual requests to password-protected content

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for plugin version under Plugins > Installed Plugins. If version is below 2.74, the site is vulnerable.

Check Version:

wp plugin get bws-like --field=version

Verify Fix Applied:

Verify plugin version is 2.74 or higher in WordPress admin panel and test that password-protected post content is no longer exposed in page source.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to password-protected posts
  • Multiple requests to plugin-specific endpoints from unauthenticated users

Network Indicators:

  • HTTP requests to /wp-content/plugins/bws-like/ endpoints without authentication

SIEM Query:

source="web_access_logs" AND (uri="/wp-content/plugins/bws-like/" OR user_agent CONTAINS "scanner") AND status=200

🔗 References

📤 Share & Export