5.8
CVE-2022-29414
- EPSS 0.1%
- Veröffentlicht 29.04.2022 17:15:22
- Zuletzt bearbeitet 21.11.2024 06:59:02
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Subscribe To Comments Reloaded <= 211130 - Cross-Site Request Forgery
Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
Mögliche Gegenmaßnahme
Subscribe To Comments Reloaded: Update to version 220502, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Subscribe To Comments Reloaded
Version
* - 211130
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpkube ≫ Subscribe To Comments Reloaded SwPlatformwordpress Version <= 211130
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.279 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
|
| nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:P/I:P/A:N
|
| audit@patchstack.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.