6.8

CVE-2013-0736

Mingle Forum <= 1.0.34 - Cross-Site Request Forgery

Multiple cross-site request forgery (CSRF) vulnerabilities in the Mingle Forum plugin 1.0.34 and possibly earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) modify user privileges or (2) conduct cross-site scripting (XSS) attacks via unspecified vectors.
Mögliche Gegenmaßnahme
Mingle Forum: Update to version 1.0.35, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Mingle Forum
Version *-1.0.34
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CartpaujMingle-forum Version <= 1.0.34
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.00
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.01
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.02
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.03
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.04
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.05
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.06
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.07
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.08
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.09
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.10
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.11
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.12
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.13
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.14
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.15
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.16
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.17
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.18
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.19
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.20
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.21
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.21.1
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.22
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.23
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.23.1
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.23.2
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.24
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.25
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.26
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.27
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.28
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.28.1
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.28.2
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.29
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.30
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.31
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.31.1
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.31.2
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.31.3
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.31.4
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.32
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.32.1
   WordpressWordpress Version-
CartpaujMingle-forum Version1.0.33
   WordpressWordpress Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.19% 0.374
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.