Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php. NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix.
References
Link | Resource |
---|---|
http://osvdb.org/93452 | |
http://wordpress.org/plugins/mail-on-update/changelog | Patch Vendor Advisory |
http://secunia.com/advisories/53449 | |
http://seclists.org/oss-sec/2013/q2/356 | Exploit |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-05-22 17:55
Updated : 2014-05-29 17:32
NVD link : CVE-2013-2107
Mitre link : CVE-2013-2107
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
mail_on_update_project
- mail_on_update