The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.
History

Tue, 03 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-01-03T05:31:18.483Z

Updated: 2025-06-03T14:44:18.802Z

Reserved: 2023-12-08T00:04:00.899Z

Link: CVE-2023-6600

cve-icon Vulnrichment

Updated: 2024-08-02T08:35:14.582Z

cve-icon NVD

Status : Modified

Published: 2024-01-03T06:15:47.337

Modified: 2025-06-03T15:15:51.917

Link: CVE-2023-6600

cve-icon Redhat

No data.