8.8
CVE-2023-0766
- EPSS 0.1%
- Veröffentlicht 30.05.2023 08:15:09
- Zuletzt bearbeitet 10.01.2025 21:15:10
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Newsletter Popup <= 1.2 - Cross-Site Request Forgery to Record Deletion
The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce.
Mögliche Gegenmaßnahme
Newsletter Popup: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Newsletter Popup
Version
*-1.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Newsletter Popup Project ≫ Newsletter Popup SwPlatformwordpress Version <= 1.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.282 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|