An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The action_builder_content function did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/siteorigin-panels/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/siteorigin-panels/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/siteorigin-panels/#developers - Release Notes, Third Party Advisory | |
References | () https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ - Exploit, Third Party Advisory |
Information
Published : 2020-05-28 04:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13642
Mitre link : CVE-2020-13642
CVE.ORG link : CVE-2020-13642
JSON object : View
Products Affected
siteorigin
- page_builder
CWE
CWE-352
Cross-Site Request Forgery (CSRF)