CVE-2022-29414

Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpkube:subscribe_to_comments_reloaded:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/wordpress-subscribe-to-comments-reloaded-plugin-211130-multiple-cross-site-request-forgery-csrf-vulnerabilities - Third Party Advisory () https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/wordpress-subscribe-to-comments-reloaded-plugin-211130-multiple-cross-site-request-forgery-csrf-vulnerabilities - Third Party Advisory
References () https://wordpress.org/plugins/subscribe-to-comments-reloaded/ - Product, Third Party Advisory () https://wordpress.org/plugins/subscribe-to-comments-reloaded/ - Product, Third Party Advisory

Information

Published : 2022-04-29 17:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29414

Mitre link : CVE-2022-29414

CVE.ORG link : CVE-2022-29414


JSON object : View

Products Affected

wpkube

  • subscribe_to_comments_reloaded
CWE
CWE-352

Cross-Site Request Forgery (CSRF)