The HubSpot WordPress plugin before 8.8.15 does not validate the proxy URL given to the proxy REST endpoint, which could allow users with the edit_posts capability (by default contributor and above) to perform SSRF attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee - Exploit, Third Party Advisory |
Information
Published : 2022-05-02 16:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1239
Mitre link : CVE-2022-1239
CVE.ORG link : CVE-2022-1239
JSON object : View
Products Affected
hubspot
- hubspot
CWE
CWE-918
Server-Side Request Forgery (SSRF)