4.3

CVE-2022-0875

Exploit

Login With OTP Over SMS, Email, WhatsApp and Google Authenticator <= 1.0.4 - Cross-Site Request Forgery to Cross-Site Scripting

The Google Authenticator WordPress plugin before 1.0.5 does not have CSRF check when saving its settings, and does not sanitise as well as escape them, allowing attackers to make a logged in admin change them and perform Cross-Site Scripting attacks
Mögliche Gegenmaßnahme
Login with TOTP (Google Authenticator, Microsoft Authenticator): Update to version 1.0.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Login with TOTP (Google Authenticator, Microsoft Authenticator)
Version *-1.0.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MiniorangeGoogle Authenticator SwPlatformwordpress Version < 1.0.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.29
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.