6.8
CVE-2013-4240
- EPSS 0.83%
- Veröffentlicht 02.04.2014 16:05:50
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
HMS Testimonials <= 2.0.10 - Cross-Site Request Forgery
Multiple cross-site request forgery (CSRF) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add new testimonials via the hms-testimonials-addnew page, (2) add new groups via the hms-testimonials-addnewgroup page, (3) change default settings via the hms-testimonials-settings page, (4) change advanced settings via the hms-testimonials-settings-advanced page, (5) change custom fields settings via the hms-testimonials-settings-fields page, or (6) change template settings via the hms-testimonials-templates-new page to wp-admin/admin.php.
Mögliche Gegenmaßnahme
HMS Testimonials: Update to version 2.0.11, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
HMS Testimonials
Version
[*, 2.0.11)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hitmyserver ≫ Hms Testimonials SwPlatformwordpress Version <= 2.0.10
Hitmyserver ≫ Hms Testimonials Version1.1 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.2 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.3 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.4 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.4.1 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.5 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.6 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.6.1 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.6.2 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.7 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version1.7.1 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.1 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.2 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.3 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.4 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.5 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.6 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.7 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.8 SwPlatformwordpress
Hitmyserver ≫ Hms Testimonials Version2.0.9 SwPlatformwordpress
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.83% | 0.737 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.