The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.
References
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://0day.today/exploit/34496 - Broken Link | |
References | () https://cxsecurity.com/issue/WLB-2020050235 - Exploit, Third Party Advisory | |
References | () https://infayer.com/archivos/448 - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user - Exploit, Third Party Advisory | |
References | () https://twitter.com/UnD3sc0n0c1d0 - Third Party Advisory | |
References | () https://wordpress.org/plugins/multi-scheduler/#developers - Product, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/48532 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-06-22 18:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13426
Mitre link : CVE-2020-13426
CVE.ORG link : CVE-2020-13426
JSON object : View
Products Affected
bdtask
- multi-scheduler
CWE
CWE-352
Cross-Site Request Forgery (CSRF)