An issue was discovered in the MULTIDOTS Woo Checkout for Digital Goods plugin 2.1 for WordPress. If an admin user can be tricked into visiting a crafted URL created by an attacker (via spear phishing/social engineering), the attacker can change the plugin settings. The function woo_checkout_settings_page in the file class-woo-checkout-for-digital-goods-admin.php doesn't do any check against wp-admin/admin-post.php Cross-site request forgery (CSRF) and user capabilities.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/woo-checkout-for-digital-goods/#developers | Release Notes |
http://labs.threatpress.com/cross-site-request-forgery-csrf-in-woo-checkout-for-digital-goods-plugin/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-05-31 13:29
Updated : 2018-06-29 11:55
NVD link : CVE-2018-11633
Mitre link : CVE-2018-11633
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
multidots
- woo_checkout_for_digital_goods