The Dokan plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.0.8. This is due to missing or incorrect nonce validation on the handle_order_export() function. This makes it possible for unauthenticated attackers to trigger an order export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ - Not Applicable | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ - Not Applicable | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ - Not Applicable | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ - Not Applicable | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ - Not Applicable | |
References | () https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ - Not Applicable | |
References | () https://plugins.trac.wordpress.org/changeset/2368433/dokan-lite/trunk/includes/Dashboard/Templates/Orders.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/894c875a-078f-4c1f-83d2-4a6e4a309c3e?source=cve - Third Party Advisory |
08 Jul 2023, 00:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wedevs:dokan:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ - Not Applicable | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/894c875a-078f-4c1f-83d2-4a6e4a309c3e?source=cve - Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ - Exploit, Technical Description, Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ - Not Applicable | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ - Not Applicable | |
References | (MISC) https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ - Not Applicable | |
References | (MISC) https://plugins.trac.wordpress.org/changeset/2368433/dokan-lite/trunk/includes/Dashboard/Templates/Orders.php - Patch | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ - Not Applicable | |
References | (MISC) https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ - Not Applicable |
03 Jul 2023, 01:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-01 06:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36748
Mitre link : CVE-2020-36748
CVE.ORG link : CVE-2020-36748
JSON object : View
Products Affected
wedevs
- dokan
CWE
No CWE.