CVE-2021-43353

The Crisp Live Chat WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the crisp_plugin_settings_page function found in the ~/crisp.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 0.31.
Configurations

Configuration 1 (hide)

cpe:2.3:a:crisp:live_chat:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2643954%40crisp&new=2643954%40crisp&sfp_email=&sfph_mail= - Issue Tracking, Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2643954%40crisp&new=2643954%40crisp&sfp_email=&sfph_mail= - Issue Tracking, Patch, Third Party Advisory
References () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-43353 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-43353 - Third Party Advisory

Information

Published : 2022-01-18 17:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43353

Mitre link : CVE-2021-43353

CVE.ORG link : CVE-2021-43353


JSON object : View

Products Affected

crisp

  • live_chat
CWE
CWE-352

Cross-Site Request Forgery (CSRF)