The LadiApp plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the publish_lp() function hooked via an AJAX action in versions up to, and including, 4.4. This makes it possible for unauthenticated attackers to change the LadiPage key (a key fully controlled by the attacker), enabling them to freely create new pages, including web pages that trigger stored XSS via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ladipage
Ladipage ladipage |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:ladipage:ladipage:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Ladipage
Ladipage ladipage |
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-03-12T09:33:56.755Z
Updated: 2024-08-02T07:37:59.533Z
Reserved: 2023-09-01T21:39:18.262Z
Link: CVE-2023-4729
Vulnrichment
Updated: 2024-08-02T07:37:59.533Z
NVD
Status : Analyzed
Published: 2024-03-12T10:15:08.197
Modified: 2025-01-15T16:31:19.903
Link: CVE-2023-4729
Redhat
No data.