The flo-launch WordPress plugin before 2.4.1 injects code into wp-config.php when creating a cloned site, allowing any attacker to initiate a new site install by setting the flo_custom_table_prefix cookie to an arbitrary value.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce - Exploit, Third Party Advisory |
26 Jun 2023, 17:59
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-04-25 16:16
Updated : 2024-11-21 06:38
NVD link : CVE-2022-0541
Mitre link : CVE-2022-0541
CVE.ORG link : CVE-2022-0541
JSON object : View
Products Affected
flothemes
- flo-launch
CWE