Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php. NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix.
References
Link | Resource |
---|---|
http://osvdb.org/93452 | |
http://seclists.org/oss-sec/2013/q2/356 | Exploit |
http://secunia.com/advisories/53449 | |
http://wordpress.org/plugins/mail-on-update/changelog | Patch Vendor Advisory |
http://osvdb.org/93452 | |
http://seclists.org/oss-sec/2013/q2/356 | Exploit |
http://secunia.com/advisories/53449 | |
http://wordpress.org/plugins/mail-on-update/changelog | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/93452 - | |
References | () http://seclists.org/oss-sec/2013/q2/356 - Exploit | |
References | () http://secunia.com/advisories/53449 - | |
References | () http://wordpress.org/plugins/mail-on-update/changelog - Patch, Vendor Advisory |
Information
Published : 2014-05-23 00:55
Updated : 2024-11-21 01:51
NVD link : CVE-2013-2107
Mitre link : CVE-2013-2107
CVE.ORG link : CVE-2013-2107
JSON object : View
Products Affected
mail_on_update_project
- mail_on_update
CWE
CWE-352
Cross-Site Request Forgery (CSRF)