An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The live editor feature did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The live_editor_panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/siteorigin-panels/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/siteorigin-panels/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/siteorigin-panels/#developers - Release Notes, Third Party Advisory | |
References | () https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ - Exploit, Third Party Advisory |
Information
Published : 2020-05-28 04:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13643
Mitre link : CVE-2020-13643
CVE.ORG link : CVE-2020-13643
JSON object : View
Products Affected
siteorigin
- page_builder
CWE
CWE-352
Cross-Site Request Forgery (CSRF)