6.8

CVE-2014-9454

Exploit

Simple Sticky Footer <= 1.3.2 - Cross-Site Request Forgery to Cross-Site Scripting

Multiple cross-site request forgery (CSRF) vulnerabilities in the Simple Sticky Footer plugin before 1.3.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or conduct cross-site scripting (XSS) attacks via the (2) simple_sf_width or (3) simple_sf_style parameter in the simple-simple-sticky-footer page to wp-admin/themes.php.
Mögliche Gegenmaßnahme
Simple Sticky Footer: Update to version 1.3.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Simple Sticky Footer
Version *-1.3.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Simple Sticky Footer ProjectSimple Sticky Footer SwPlatformwordpress Version <= 1.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.25% 0.458
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.