CVE-2022-3747

The Becustom plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5.2. This is due to missing nonce validation when saving the plugin's settings. This makes it possible for unauthenticated attackers to update the plugin's settings like betheme_url_slug, replaced_theme_author, and betheme_label to name a few, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:muffingroup:becustom:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt - Exploit, Third Party Advisory () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt - Exploit, Third Party Advisory
References () https://muffingroup.com/betheme/features/be-custom/ - Product () https://muffingroup.com/betheme/features/be-custom/ - Product
References () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747 - Third Party Advisory
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.8

Information

Published : 2022-11-29 21:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-3747

Mitre link : CVE-2022-3747

CVE.ORG link : CVE-2022-3747


JSON object : View

Products Affected

muffingroup

  • becustom
CWE
CWE-352

Cross-Site Request Forgery (CSRF)