cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-3244,https://securityvulnerability.io/vulnerability/CVE-2023-3244,Unauthorized Data Modification in Comments Like Dislike Plugin for WordPress,"The Comments Like Dislike plugin for WordPress contains a vulnerability allowing authenticated attackers with low-level permissions, such as subscribers, to perform unauthorized modifications to plugin settings. This occurs due to an absent capability check within the restore_settings function invoked via AJAX. Attackers can exploit this flaw to reset the plugin's configurations, potentially disrupting website functionality and user experience. Despite attempts to notify the developer, the issue remains unresolved, prompting public disclosure.",Wordpress,Comments Like Dislike,5.3,MEDIUM,0.0004799999878741801,false,,false,false,true,true,false,false,2023-08-17T07:15:00.000Z,0 CVE-2021-24379,https://securityvulnerability.io/vulnerability/CVE-2021-24379,Comments Like Dislike < 1.1.4 - Add Like/Dislike Bypass,"The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some Restriction modes, such as Cookie Restriction, IP Restrictions, Logged In User Restriction, however, they do not prevent such attack as they only check client side",Wordpress,Comments Like Dislike,5.3,MEDIUM,0.0014199999859556556,false,,false,false,false,,false,false,2021-06-21T19:18:25.000Z,0