CVE-2022-1599

The Admin Management Xtended WordPress plugin before 2.4.5 does not have CSRF checks in some of its AJAX actions, allowing attackers to make a logged users with the right capabilities to call them. This can lead to changes in post status (draft, published), slug, post date, comment status (enabled, disabled) and more.
Configurations

Configuration 1 (hide)

cpe:2.3:a:admin_management_xtended_project:admin_management_xtended:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6 - Exploit, Third Party Advisory

Information

Published : 2022-07-11 13:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1599

Mitre link : CVE-2022-1599

CVE.ORG link : CVE-2022-1599


JSON object : View

Products Affected

admin_management_xtended_project

  • admin_management_xtended
CWE
CWE-352

Cross-Site Request Forgery (CSRF)