Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rff5-6q73-5r3m

Опубликовано: 01 мар. 2022
Источник: github
Github: Не прошло ревью

Описание

In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example

In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example

EPSS

Процентиль: 30%
0.0011
Низкий

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
nvd
почти 4 года назад

In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example

EPSS

Процентиль: 30%
0.0011
Низкий

Дефекты

CWE-352