The CB (legacy) WordPress plugin through 0.9.4.18 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting codes, timeframes, and bookings via CSRF attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/ | Exploit Third Party Advisory |
Configurations
History
17 Jul 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wielebenwir
Wielebenwir commonsbooking |
|
References | () https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-352 | |
CPE | cpe:2.3:a:wielebenwir:commonsbooking:*:*:*:*:*:wordpress:*:* | |
Summary |
|
21 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 06:15
Updated : 2024-07-17 02:56
NVD link : CVE-2024-4382
Mitre link : CVE-2024-4382
CVE.ORG link : CVE-2024-4382
JSON object : View
Products Affected
wielebenwir
- commonsbooking
CWE
CWE-352
Cross-Site Request Forgery (CSRF)