The Option Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing nonce validation on the plugin_page() function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
References
Configurations
History
21 Feb 2025, 15:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Backie option Editor
Backie |
|
CPE | cpe:2.3:a:backie:option_editor:*:*:*:*:*:*:*:* | |
References | () https://plugins.trac.wordpress.org/browser/option-editor/trunk/option-editor.php#L70 - Product | |
References | () https://wordpress.org/plugins/option-editor/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/50adbe1d-9d79-4015-9e09-2166f97efc47?source=cve - Third Party Advisory |
18 Feb 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 05:15
Updated : 2025-02-21 15:50
NVD link : CVE-2024-13852
Mitre link : CVE-2024-13852
CVE.ORG link : CVE-2024-13852
JSON object : View
Products Affected
backie
- option_editor
CWE
CWE-352
Cross-Site Request Forgery (CSRF)