Multiple cross-site request forgery (CSRF) vulnerabilities in the Private Only plugin 3.5.1 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add users, (2) delete posts, or (3) modify PHP files via unspecified vectors, or (4) conduct cross-site scripting (XSS) attacks via the po_logo parameter in the privateonly.php page to wp-admin/options-general.php.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2015/Aug/77 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/133349/WordPress-Private-Only-3.5.1-CSRF-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://security.dxw.com/advisories/csrfxss-vulnerability-in-private-only-could-allow-an-attacker-to-do-almost-anything-an-admin-user-can/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-01-28 12:15
Updated : 2020-01-31 12:53
NVD link : CVE-2015-5483
Mitre link : CVE-2015-5483
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
private_only_project
- private_only