Multiple cross-site request forgery (CSRF) vulnerabilities in twitget.php in the Twitget plugin before 3.3.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that change unspecified plugin options via a request to wp-admin/options-general.php.
References
Configurations
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/126134 - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Apr/172 - Exploit | |
References | () http://secunia.com/advisories/57892 - | |
References | () http://wordpress.org/plugins/twitget/changelog - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/92391 - | |
References | () https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 - Exploit |
Information
Published : 2014-10-17 22:55
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2559
Mitre link : CVE-2014-2559
CVE.ORG link : CVE-2014-2559
JSON object : View
Products Affected
twitget_project
- twitget
CWE
CWE-352
Cross-Site Request Forgery (CSRF)