Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-7048

Опубликовано: 11 янв. 2024
Источник: nvd
CVSS3: 3.1
CVSS3: 4.3
EPSS Низкий

Описание

The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*
Версия до 2.6.6 (включая)

EPSS

Процентиль: 32%
0.00122
Низкий

3.1 Low

CVSS3

4.3 Medium

CVSS3

Дефекты

CWE-352
CWE-352

Связанные уязвимости

CVSS3: 3.1
github
около 2 лет назад

The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function.

EPSS

Процентиль: 32%
0.00122
Низкий

3.1 Low

CVSS3

4.3 Medium

CVSS3

Дефекты

CWE-352
CWE-352