The Christmasify! plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.5. This is due to missing nonce validation on the 'options' function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 10 Aug 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Christmasify! plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.5. This is due to missing nonce validation on the 'options' function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | Christmasify! <= 1.5.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-10T05:37:25.794Z
Updated: 2024-08-13T15:28:18.471Z
Reserved: 2024-08-06T20:51:27.935Z
Link: CVE-2024-7574
Vulnrichment
Updated: 2024-08-13T15:28:14.294Z
NVD
Status : Awaiting Analysis
Published: 2024-08-12T13:38:43.940
Modified: 2024-08-12T13:41:36.517
Link: CVE-2024-7574
Redhat
No data.