The OSMapper WordPress plugin through 2.1.5 contains an AJAX action to delete a plugin related post type named 'map' and is registered with the wp_ajax_nopriv prefix, making it available to unauthenticated users. There is no authorisation, CSRF and checks in place to ensure that the post to delete is a map one. As a result, unauthenticated user can delete arbitrary posts from the blog
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/f0f2af29-e21e-4d16-9424-1a49bff7fb86 - Exploit, Third Party Advisory |
Information
Published : 2022-03-28 18:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-24978
Mitre link : CVE-2021-24978
CVE.ORG link : CVE-2021-24978
JSON object : View
Products Affected
b4after
- osmapper