The DX Share Selection plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the dxss_admin_page() function found in the ~/dx-share-selection.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2001 | Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2747572/dx-share-selection/trunk?contextall=1&old=2384535&old_path=%2Fdx-share-selection%2Ftrunk | Patch Third Party Advisory |
Configurations
Information
Published : 2022-07-18 10:15
Updated : 2022-07-25 10:04
NVD link : CVE-2022-2001
Mitre link : CVE-2022-2001
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
devrix
- dx_share_selection