The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.5 does not have authorisation and CSRF checks in the updateIpAddress AJAX action, allowing any authenticated user to call it, or make a logged in user do it via a CSRF attack and add an arbitrary IP address to exclude. Furthermore, due to the lack of validation, sanitisation and escaping, users could set a malicious value and perform Cross-Site Scripting attacks against logged in admin
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/05b9e478-2d3b-4460-88c1-7f81d3a68ac4 - Exploit, Third Party Advisory |
Information
Published : 2022-02-28 09:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25042
Mitre link : CVE-2021-25042
CVE.ORG link : CVE-2021-25042
JSON object : View
Products Affected
plugins-market
- wp_visitor_statistics_\(real_time_traffic\)
CWE
CWE-862
Missing Authorization