The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when deleting its shortcode, which could allow attackers to make logged in admins delete arbitrary shortcode via a CSRF attack
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b - Exploit, Third Party Advisory |
22 Aug 2023, 16:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:tiempo:tiempo:*:*:*:*:*:wordpress:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | (MISC) https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b - Exploit, Third Party Advisory |
16 Aug 2023, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-08-16 12:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2271
Mitre link : CVE-2023-2271
CVE.ORG link : CVE-2023-2271
JSON object : View
Products Affected
tiempo
- tiempo
CWE
No CWE.
