The Hustle (aka wordpress-popup) plugin 6.0.7 for WordPress is vulnerable to CSV Injection as it allows for injecting malicious code into a pop-up window. Successful exploitation grants an attacker with a right to execute malicious code on the administrator's computer through Excel functions as the plugin does not sanitize the user's input and allows insertion of any text.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/wordpress-popup/#developers | Release Notes |
https://blog.reddy.io/category/cybersecurity/ | Broken Link Exploit Third Party Advisory |
https://blog.reddy.io/2019/05/24/reddy-solutions-found-a-csv-injection-vulnerability-in-hustle-wordpress-plugin/ | Broken Link Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9326 | Third Party Advisory |
Configurations
Information
Published : 2019-05-29 12:29
Updated : 2023-02-24 11:33
NVD link : CVE-2019-11872
Mitre link : CVE-2019-11872
JSON object : View
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File
Products Affected
incsub
- hustle