The Crisp Live Chat WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the crisp_plugin_settings_page function found in the ~/crisp.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 0.31.
References
| Link | Resource |
|---|---|
| https://www.wordfence.com/vulnerability-advisories/#CVE-2021-43353 | Third Party Advisory |
| https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2643954%40crisp&new=2643954%40crisp&sfp_email=&sfph_mail= | Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2022-01-18 09:15
Updated : 2022-01-24 12:28
NVD link : CVE-2021-43353
Mitre link : CVE-2021-43353
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
crisp
- live_chat


