The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2020050235 | Exploit Third Party Advisory |
https://wordpress.org/plugins/multi-scheduler/#developers | Product Third Party Advisory |
https://twitter.com/UnD3sc0n0c1d0 | Third Party Advisory |
https://infayer.com/archivos/448 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/48532 | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user | Exploit Third Party Advisory |
https://0day.today/exploit/34496 | Broken Link |
Configurations
Information
Published : 2020-06-22 11:15
Updated : 2020-06-26 09:16
NVD link : CVE-2020-13426
Mitre link : CVE-2020-13426
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
bdtask
- multi-scheduler