The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5 - Exploit, Third Party Advisory |
Information
Published : 2022-09-26 13:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3119
Mitre link : CVE-2022-3119
CVE.ORG link : CVE-2022-3119
JSON object : View
Products Affected
oauth_client_single_sign_on_project
- oauth_client_single_sign_on