An issue was discovered in the Real-Time Find and Replace plugin before 4.0.2 for WordPress. The far_options_page function did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The find and replace rules could be updated with malicious JavaScript, allowing for that be executed later in the victims browser.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/real-time-find-and-replace/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/04/high-severity-vulnerability-patched-in-real-time-find-and-replace-plugin/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/real-time-find-and-replace/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/04/high-severity-vulnerability-patched-in-real-time-find-and-replace-plugin/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/real-time-find-and-replace/#developers - Release Notes, Third Party Advisory | |
References | () https://www.wordfence.com/blog/2020/04/high-severity-vulnerability-patched-in-real-time-find-and-replace-plugin/ - Exploit, Third Party Advisory |
Information
Published : 2020-05-28 04:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13641
Mitre link : CVE-2020-13641
CVE.ORG link : CVE-2020-13641
JSON object : View
Products Affected
infolific
- real-time_find_and_replace
CWE
CWE-352
Cross-Site Request Forgery (CSRF)