6.8
CVE-2013-3476
- EPSS 0.14%
- Veröffentlicht 02.06.2014 15:55:10
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle PSIRT-CNA@flexerasoftware.com
- CVE-Watchlists
- Unerledigt
Related Posts < 2.7.2 - Cross-Site Request Forgery
Cross-site request forgery (CSRF) vulnerability in the WordPress Related Posts plugin before 2.6.2 for WordPress allows remote attackers to hijack the authentication of users for requests that change settings via unspecified vectors.
Mögliche Gegenmaßnahme
WordPress Related Posts: Update to version 2.7.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WordPress Related Posts
Version
[*, 2.7.2)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zemanta ≫ Related Posts SwPlatformwordpress Version <= 2.6
Zemanta ≫ Related Posts Version1.0 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.1 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.2 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.3 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.3.1 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.3.2 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.3.3 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.4 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.5 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.6 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.7 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.8 SwPlatformwordpress
Zemanta ≫ Related Posts Version1.8.1 SwPlatformwordpress
Zemanta ≫ Related Posts Version2.3 SwPlatformwordpress
Zemanta ≫ Related Posts Version2.4.1 SwPlatformwordpress
Zemanta ≫ Related Posts Version2.5.1 SwPlatformwordpress
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.307 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.