The Duplicate Page or Post WordPress plugin before 1.5.1 does not have any authorisation and has a flawed CSRF check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin's settings, or perform such attack via CSRF. Furthermore, due to the lack of escaping, this could lead to Stored Cross-Site Scripting issues
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b - Exploit, Third Party Advisory |
Information
Published : 2022-02-21 11:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25075
Mitre link : CVE-2021-25075
CVE.ORG link : CVE-2021-25075
JSON object : View
Products Affected
wpdevart
- duplicate_page_or_post
CWE
CWE-862
Missing Authorization