4.3

CVE-2021-4427

Exploit

Vuukle Comments, Reactions, Share Bar, Revenue <= 3.4.31 - Cross-Site Request Forgery Bypass

The Vuukle Comments, Reactions, Share Bar, Revenue plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.31. This is due to missing or incorrect nonce validation in the /admin/partials/free-comments-for-wordpress-vuukle-admin-display.php file. This makes it possible for unauthenticated attackers to edit the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Mögliche Gegenmaßnahme
Vuukle Comments, Reactions, Share Bar, Revenue: Update to version 4.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Vuukle Comments, Reactions, Share Bar, Revenue
Version * - 3.4.31
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VuukleVuukle Comments, Reactions, Share Bar, Revenue SwPlatformwordpress Version <= 3.4.31
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.13% 0.324
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@wordfence.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N