The OneStore Sites plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 0.1.1 via the class-export.php file. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
References
Configurations
History
11 Mar 2025, 20:06
Type | Values Removed | Values Added |
---|---|---|
First Time |
Onestore Sites *
Onestore Sites |
|
Summary |
|
|
CPE | cpe:2.3:sainwp:onestore_sites:*:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/onestore-sites/trunk/classess/class-export.php#L3 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/f2c70d5f-beb3-480e-8ea8-c3ab01ce5a20?source=cve - Third Party Advisory |
27 Feb 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 05:15
Updated : 2025-03-11 20:06
NVD link : CVE-2024-13905
Mitre link : CVE-2024-13905
CVE.ORG link : CVE-2024-13905
JSON object : View
Products Affected
onestore_sites
- *
CWE
CWE-918
Server-Side Request Forgery (SSRF)