CVE-2013-2107

Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php. NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mail_on_update_project:mail_on_update:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:mail_on_update_project:mail_on_update:5.0.0:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 01:51

Type Values Removed Values Added
References () http://osvdb.org/93452 - () http://osvdb.org/93452 -
References () http://seclists.org/oss-sec/2013/q2/356 - Exploit () http://seclists.org/oss-sec/2013/q2/356 - Exploit
References () http://secunia.com/advisories/53449 - () http://secunia.com/advisories/53449 -
References () http://wordpress.org/plugins/mail-on-update/changelog - Patch, Vendor Advisory () http://wordpress.org/plugins/mail-on-update/changelog - Patch, Vendor Advisory

Information

Published : 2014-05-23 00:55

Updated : 2024-11-21 01:51


NVD link : CVE-2013-2107

Mitre link : CVE-2013-2107

CVE.ORG link : CVE-2013-2107


JSON object : View

Products Affected

mail_on_update_project

  • mail_on_update
CWE
CWE-352

Cross-Site Request Forgery (CSRF)