CVE-2023-6292

The Ecwid Ecommerce Shopping Cart WordPress plugin before 6.12.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - Exploit, Third Party Advisory

23 Jan 2024, 14:47

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*
First Time Lightspeedhq ecwid Ecommerce Shopping Cart
Lightspeedhq
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-352

16 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 16:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6292

Mitre link : CVE-2023-6292

CVE.ORG link : CVE-2023-6292


JSON object : View

Products Affected

lightspeedhq

  • ecwid_ecommerce_shopping_cart
CWE
CWE-352

Cross-Site Request Forgery (CSRF)