A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199.
References
Link | Resource |
---|---|
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d | Patch Third Party Advisory |
https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2 | Patch Third Party Advisory |
https://vuldb.com/?id.216199 | Third Party Advisory |
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d | Patch Third Party Advisory |
https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2 | Patch Third Party Advisory |
https://vuldb.com/?id.216199 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | () https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d - Patch, Third Party Advisory | |
References | () https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2 - Patch, Third Party Advisory | |
References | () https://vuldb.com/?id.216199 - Third Party Advisory |
Information
Published : 2022-12-18 11:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4604
Mitre link : CVE-2022-4604
CVE.ORG link : CVE-2022-4604
JSON object : View
Products Affected
wp-english-wp-admin_project
- wp-english-wp-admin
CWE
CWE-352
Cross-Site Request Forgery (CSRF)