The DX Share Selection plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the dxss_admin_page() function found in the ~/dx-share-selection.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
References
Configurations
History
24 Oct 2023, 20:39
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://plugins.trac.wordpress.org/browser/dx-share-selection/trunk/dx-share-selection.php#L284 - Product | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/6a85fe7f-2d28-4509-99f2-875cb63c6500?source=cve - Third Party Advisory | |
References | (MISC) https://wordpress.org/plugins/dx-share-selection/ - Product | |
CWE | CWE-352 |
20 Oct 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References |
|
Information
Published : 2022-07-18 17:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-2001
Mitre link : CVE-2022-2001
CVE.ORG link : CVE-2022-2001
JSON object : View
Products Affected
devrix
- dx_share_selection
CWE
CWE-352
Cross-Site Request Forgery (CSRF)