The LadiApp plugn for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.4. This makes it possible for unauthenticated attackers to modify a variety of settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts,
Advisories
Source ID Title
EUVD EUVD EUVD-2023-54579 The LadiApp plugn for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.4. This makes it possible for unauthenticated attackers to modify a variety of settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts,
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 15 Jan 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Ladipage
Ladipage ladipage
Weaknesses CWE-352
CPEs cpe:2.3:a:ladipage:ladipage:*:*:*:*:*:wordpress:*:*
Vendors & Products Ladipage
Ladipage ladipage

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-02T07:37:59.920Z

Reserved: 2023-09-01T21:45:34.921Z

Link: CVE-2023-4731

cve-icon Vulnrichment

Updated: 2024-08-02T07:37:59.920Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-12T10:15:08.363

Modified: 2025-01-15T16:31:04.880

Link: CVE-2023-4731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses