The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to update the plugin settings via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-58243 The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to update the plugin settings via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-05T18:50:59.625Z

Reserved: 2023-11-06T23:00:34.618Z

Link: CVE-2023-5975

cve-icon Vulnrichment

Updated: 2024-08-02T08:14:25.157Z

cve-icon NVD

Status : Modified

Published: 2023-11-07T11:15:12.117

Modified: 2024-11-21T08:42:54.140

Link: CVE-2023-5975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses