6.5

CVE-2022-3926

Exploit

WP OAuth Server (OAuth Authentication) <= 4.2.5 - Cross-Site Request Forgery

The WP OAuth Server (OAuth Authentication) WordPress plugin before 3.4.2 does not have CSRF check when regenerating secrets, which could allow attackers to make logged in admins regenerate the secret of an arbitrary client given they know the client ID
Mögliche Gegenmaßnahme
WP OAuth Server (OAuth Authentication): Update to version 4.3.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WP OAuth Server (OAuth Authentication)
Version *-4.2.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wp-oauthWp Oauth Server SwPlatformwordpress Version < 3.4.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.224
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.