The Theme My Login plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.1.7. This is due to missing or incorrect nonce validation on the tml_admin_save_ms_settings() function. This makes it possible for unauthenticated attackers to update the theme's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note that this only affects multi-site instances.
Metrics
Affected Vendors & Products
References
History
Fri, 16 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 Aug 2024 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Theme My Login plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.1.7. This is due to missing or incorrect nonce validation on the tml_admin_save_ms_settings() function. This makes it possible for unauthenticated attackers to update the theme's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note that this only affects multi-site instances. | |
Title | Theme My Login <= 7.1.7 - Cross-Site Request Forgery to Settings Update | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-16T03:20:19.025Z
Updated: 2024-08-16T15:09:37.311Z
Reserved: 2024-08-02T14:23:47.940Z
Link: CVE-2024-7422
Vulnrichment
Updated: 2024-08-16T15:09:29.704Z
NVD
Status : Awaiting Analysis
Published: 2024-08-16T04:15:07.497
Modified: 2024-08-19T13:00:23.117
Link: CVE-2024-7422
Redhat
No data.