Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxrw-m55w-9qx8

Опубликовано: 11 июл. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.3

Описание

The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for unauthenticated attackers to update the plugins settings, via a forged request granted the attacker can trick a site's administrator into performing an action such as clicking on a link.

The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for unauthenticated attackers to update the plugins settings, via a forged request granted the attacker can trick a site's administrator into performing an action such as clicking on a link.

EPSS

Процентиль: 14%
0.00046
Низкий

8.3 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.3
nvd
больше 2 лет назад

The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for unauthenticated attackers to update the plugins settings, via a forged request granted the attacker can trick a site's administrator into performing an action such as clicking on a link.

EPSS

Процентиль: 14%
0.00046
Низкий

8.3 High

CVSS3

Дефекты

CWE-352