An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:49:24.582Z

Reserved: 2019-07-05T00:00:00

Link: CVE-2019-13344

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-05T16:15:11.667

Modified: 2024-11-21T04:24:45.410

Link: CVE-2019-13344

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses