Description
The LadiApp plugn for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.4. This makes it possible for unauthenticated attackers to modify a variety of settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts,
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54579 | The LadiApp plugn for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.4. This makes it possible for unauthenticated attackers to modify a variety of settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts, |
References
History
Wed, 15 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ladipage
Ladipage ladipage |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:ladipage:ladipage:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Ladipage
Ladipage ladipage |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-02T07:37:59.920Z
Reserved: 2023-09-01T21:45:34.921Z
Link: CVE-2023-4731
Updated: 2024-08-02T07:37:59.920Z
Status : Analyzed
Published: 2024-03-12T10:15:08.363
Modified: 2025-01-15T16:31:04.880
Link: CVE-2023-4731
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD