Cross-site request forgery (CSRF) vulnerability in the Disable Comments plugin before 1.0.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that enable comments via a request to the disable_comments_settings page to wp-admin/options-general.php.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/92219 | Third Party Advisory VDB Entry |
https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/disable-comments/#developers | Product Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92219 | Third Party Advisory VDB Entry |
https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/disable-comments/#developers | Product Third Party Advisory |
Configurations
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/92219 - Third Party Advisory, VDB Entry | |
References | () https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/ - Exploit, Third Party Advisory | |
References | () https://wordpress.org/plugins/disable-comments/#developers - Product, Third Party Advisory |
Information
Published : 2018-03-19 21:29
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2550
Mitre link : CVE-2014-2550
CVE.ORG link : CVE-2014-2550
JSON object : View
Products Affected
disable_comments
- disable_comments_project
CWE
CWE-352
Cross-Site Request Forgery (CSRF)