An issue was discovered in the MULTIDOTS Add Social Share Messenger Buttons Whatsapp and Viber plugin 1.0.8 for WordPress. If an admin user can be tricked into visiting a crafted URL created by an attacker (via spear phishing/social engineering), the attacker can change the plugin settings via wp-admin/admin-post.php CSRF. There's no nonce or capability check in the whatsapp_share_setting_add_update() function.
References
Link | Resource |
---|---|
http://labs.threatpress.com/cross-site-request-forgery-csrf-in-add-social-share-messenger-buttons-whatsapp-and-viber-plugin/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/add-social-share-buttons/#developers | Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-05-31 20:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-11632
Mitre link : CVE-2018-11632
CVE.ORG link : CVE-2018-11632
JSON object : View
Products Affected
multidots
- add_social_share_messenger_buttons_whatsapp_and_viber
CWE
CWE-352
Cross-Site Request Forgery (CSRF)