The Favicon Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the output_sub_admin_page_0 function. This makes it possible for unauthenticated attackers to delete arbitrary files on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The plugin author deleted the functionality of the plugin to patch this issue and close the plugin, we recommend seeking an alternative to this plugin.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pixeljar
Pixeljar favicon Generator |
|
CPEs | cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Pixeljar
Pixeljar favicon Generator |
Mon, 26 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 24 Aug 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Favicon Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the output_sub_admin_page_0 function. This makes it possible for unauthenticated attackers to delete arbitrary files on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The plugin author deleted the functionality of the plugin to patch this issue and close the plugin, we recommend seeking an alternative to this plugin. | |
Title | Favicon Generator <= 1.5 - Cross-Site Request Forgery to Arbitrary File Deletion | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-24T02:02:31.547Z
Updated: 2024-08-26T15:13:13.151Z
Reserved: 2024-08-06T19:03:43.101Z
Link: CVE-2024-7568
Vulnrichment
Updated: 2024-08-26T15:12:55.328Z
NVD
Status : Analyzed
Published: 2024-08-24T02:15:04.490
Modified: 2024-09-27T00:41:18.483
Link: CVE-2024-7568
Redhat
No data.