The Top 10 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.10.4. This is due to missing or incorrect nonce validation on the tptn_export_tables() function. This makes it possible for unauthenticated attackers to generate an export of the top 10 table via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ - Exploit, Third Party Advisory | |
References | () https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ - Exploit, Third Party Advisory | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ - Exploit, Third Party Advisory | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ - Exploit, Third Party Advisory | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ - Exploit, Third Party Advisory | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ - Exploit, Third Party Advisory | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ - Exploit, Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368373%40top-10&new=2368373%40top-10&sfp_email=&sfph_mail= - Patch, Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/f0af86e4-c30b-49e2-ad6a-97a415a74d18?source=cve - Exploit, Patch, Third Party Advisory |
07 Nov 2023, 03:22
Type | Values Removed | Values Added |
---|---|---|
CWE |
19 Jul 2023, 19:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webberzone:top_10:*:*:*:*:*:wordpress:*:* | |
First Time |
Webberzone
Webberzone top 10 |
|
References | (MISC) https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ - Exploit, Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ - Exploit, Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ - Exploit, Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ - Exploit, Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368373%40top-10&new=2368373%40top-10&sfp_email=&sfph_mail= - Patch, Product | |
References | (MISC) https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ - Exploit, Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ - Exploit, Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ - Exploit, Third Party Advisory | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/f0af86e4-c30b-49e2-ad6a-97a415a74d18?source=cve - Exploit, Patch, Third Party Advisory |
12 Jul 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-12 08:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36761
Mitre link : CVE-2020-36761
CVE.ORG link : CVE-2020-36761
JSON object : View
Products Affected
webberzone
- top_10
CWE
No CWE.