6.8
CVE-2013-2700
- EPSS 0.25%
- Veröffentlicht 14.05.2014 19:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle PSIRT-CNA@flexerasoftware.com
- CVE-Watchlists
- Unerledigt
WP125 <= 1.4.9 - Cross-Site Request Forgery
Cross-site request forgery (CSRF) vulnerability in the Add/Edit page (adminmenus.php) in the WP125 plugin before 1.5.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that add or edit an ad via unspecified vectors.
Mögliche Gegenmaßnahme
WP125: Update to version 1.5.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP125
Version
* - 1.4.9
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Webmaster-source ≫ Wp125 SwPlatformwordpress Version <= 1.4.9
Webmaster-source ≫ Wp125 Version1.0.0 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.1.0 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.2.0 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.3.0 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.3.7 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.3.8 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.3.9 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.0 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.1 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.2 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.3 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.4 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.5 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.6 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.7 SwPlatformwordpress
Webmaster-source ≫ Wp125 Version1.4.8 SwPlatformwordpress
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.25% | 0.455 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.