The iubenda WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscriber can grant themselves any privileges, such as edit_plugins etc
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/c47fdca8-74ac-48a4-9780-556927fb4e52 | Exploit Third Party Advisory |
Configurations
History
04 Jul 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The iubenda WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscriber can grant themselves any privileges, such as edit_plugins etc |
27 Jun 2023, 18:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-02 22:15
Updated : 2024-02-04 23:14
NVD link : CVE-2022-3911
Mitre link : CVE-2022-3911
CVE.ORG link : CVE-2022-3911
JSON object : View
Products Affected
iubenda
- iubenda-cookie-law-solution