CVE-2023-6109

The YOP Poll plugin for WordPress is vulnerable to a race condition in all versions up to, and including, 6.5.26. This is due to improper restrictions on the add() function. This makes it possible for unauthenticated attackers to place multiple votes on a single poll even when the poll is set to one vote per person.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yop-poll:yop_poll:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.7
v2 : unknown
v3 : 5.3
References () https://plugins.trac.wordpress.org/changeset/2959124/yop-poll/trunk/admin/models/votes.php - Patch () https://plugins.trac.wordpress.org/changeset/2959124/yop-poll/trunk/admin/models/votes.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/360b1927-a863-46be-ad11-3f6251c75a3c?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/360b1927-a863-46be-ad11-3f6251c75a3c?source=cve - Third Party Advisory

20 Nov 2023, 17:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 07:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6109

Mitre link : CVE-2023-6109

CVE.ORG link : CVE-2023-6109


JSON object : View

Products Affected

yop-poll

  • yop_poll
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')