The Autolinks WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, and does not sanitise as well as escape them, which could allow attackers to perform Stored Cross-Site scripting against a logged in admin via a CSRF attack
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 - Exploit, Third Party Advisory |
27 Apr 2022, 12:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 5.4 |
CPE | cpe:2.3:a:autolinks_project:autolinks:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505 - Exploit, Third Party Advisory |
18 Apr 2022, 18:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-18 18:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1112
Mitre link : CVE-2022-1112
CVE.ORG link : CVE-2022-1112
JSON object : View
Products Affected
autolinks_project
- autolinks