The Quick Subscribe WordPress plugin through 1.7.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and leading to Stored XSS due to the lack of sanitisation and escaping in some of them
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/44555c79-480d-4b6a-9fda-988183c06909 | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-06-13 06:15
Updated : 2022-06-21 09:29
NVD link : CVE-2022-1792
Mitre link : CVE-2022-1792
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
quick_subscribe_project
- quick_subscribe