6.8

CVE-2013-2107

Exploit

Mail On Update < 5.3.0 - Cross-Site Request Forgery

Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php.  NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix.
Mögliche Gegenmaßnahme
Mail On Update: Update to version 5.3.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Mail On Update
Version [*, 5.3.0)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mail On Update ProjectMail On Update SwPlatformwordpress Version <= 5.1.0
Mail On Update ProjectMail On Update Version5.0.0 SwPlatformwordpress
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.7% 0.715
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.