The WP Login Security and History WordPress plugin through 1.0 did not have CSRF check when saving its settings, not any sanitisation or validation on them. This could allow attackers to make logged in administrators change the plugin's settings to arbitrary values, and set XSS payloads on them as well
References
Link | Resource |
---|---|
https://m0ze.ru/vulnerability/%5B2021-03-29%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-Login-Security-and-History-WordPress-Plugin-v1.0.txt | Exploit Third Party Advisory |
https://m0ze.ru/exploit/csrf-wp-login-security-and-history-v1.0.html | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/eeb41d7b-8f9e-4a12-b65f-f310f08e4ace | Exploit Third Party Advisory |
https://m0ze.ru/vulnerability/[2021-03-29]-[WordPress]-[CWE-352]-WP-Login-Security-and-History-WordPress-Plugin-v1.0.txt | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-06-01 07:15
Updated : 2022-07-29 09:18
NVD link : CVE-2021-24328
Mitre link : CVE-2021-24328
JSON object : View
CWE
Products Affected
clogica
- wp_login_security_and_history