CVE-2022-1912

The Button Widget Smartsoft plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation on the smartsoftbutton_settings page. This makes it possible for unauthenticated attackers to update the plugins settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartsoft:button_widget_smartsoft:1.0.1:*:*:*:*:wordpress:*:*

History

25 Jul 2022, 03:21

Type Values Removed Values Added
References (MISC) https://plugins.trac.wordpress.org/browser/smartsoftbutton-widget-de-botones-de-chat/trunk/admin/pages/settings.php#L60 - (MISC) https://plugins.trac.wordpress.org/browser/smartsoftbutton-widget-de-botones-de-chat/trunk/admin/pages/settings.php#L60 - Patch, Third Party Advisory
References (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1912 - (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1912 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:smartsoft:button_widget_smartsoft:1.0.1:*:*:*:*:wordpress:*:*
CWE CWE-352

18 Jul 2022, 17:51

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-18 17:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-1912

Mitre link : CVE-2022-1912

CVE.ORG link : CVE-2022-1912


JSON object : View

Products Affected

smartsoft

  • button_widget_smartsoft
CWE
CWE-352

Cross-Site Request Forgery (CSRF)