Cross-site request forgery (CSRF) vulnerability in the JW Player plugin before 2.1.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that remove players via a delete action to wp-admin/admin.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2014/Jun/64 - Exploit | |
References | () http://secunia.com/advisories/59173 - | |
References | () http://wordpress.org/plugins/jw-player-plugin-for-wordpress/changelog - Patch | |
References | () https://security.dxw.com/advisories/jw-player-for-flash-html5-video/ - Exploit |
Information
Published : 2014-06-25 20:55
Updated : 2024-11-21 02:09
NVD link : CVE-2014-4030
Mitre link : CVE-2014-4030
CVE.ORG link : CVE-2014-4030
JSON object : View
Products Affected
longtailvideo
- jw_player_for_flash_\&_html5_video_plugin
CWE
CWE-352
Cross-Site Request Forgery (CSRF)