The ToolBar to Share plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0. This is due to missing nonce validation on the plugin_toolbar_comparte page. This makes it possible for unauthenticated attackers to update the plugins settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/toolbar-to-share/trunk/toolbartoshare.php - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/fbda7670-179a-41ed-8ec9-ae7f5102e645?source=cve - | |
References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1918 - Third Party Advisory |
11 Jan 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-06-13 13:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1918
Mitre link : CVE-2022-1918
CVE.ORG link : CVE-2022-1918
JSON object : View
Products Affected
toolbar_to_share_project
- toolbar_to_share
CWE
CWE-352
Cross-Site Request Forgery (CSRF)