The UberMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.3. This is due to missing or incorrect nonce validation on the ubermenu_delete_all_item_settings and ubermenu_reset_settings functions. This makes it possible for unauthenticated attackers to delete and reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 20 Aug 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sevenspark
Sevenspark ubermenu |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:sevenspark:ubermenu:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Sevenspark
Sevenspark ubermenu |
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-06-22T05:47:56.767Z
Updated: 2024-08-01T20:12:07.928Z
Reserved: 2024-04-10T14:50:36.074Z
Link: CVE-2024-3593
Vulnrichment
Updated: 2024-08-01T20:12:07.928Z
NVD
Status : Modified
Published: 2024-06-22T06:15:09.683
Modified: 2024-11-21T09:29:56.757
Link: CVE-2024-3593
Redhat
No data.