The YOP Poll plugin for WordPress is vulnerable to a race condition in all versions up to, and including, 6.5.26. This is due to improper restrictions on the add() function. This makes it possible for unauthenticated attackers to place multiple votes on a single poll even when the poll is set to one vote per person.
References
Configurations
History
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://plugins.trac.wordpress.org/changeset/2959124/yop-poll/trunk/admin/models/votes.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/360b1927-a863-46be-ad11-3f6251c75a3c?source=cve - Third Party Advisory |
20 Nov 2023, 17:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 07:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6109
Mitre link : CVE-2023-6109
CVE.ORG link : CVE-2023-6109
JSON object : View
Products Affected
yop-poll
- yop_poll
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')