The FreeMind WP Browser plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.2. This is due to missing nonce protection on the FreemindOptions() function found in the ~/freemind-wp-browser.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/freemind-wp-browser/trunk/freemind-wp-browser.php#L104 | Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2443 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-07-18 10:15
Updated : 2022-07-25 08:40
NVD link : CVE-2022-2443
Mitre link : CVE-2022-2443
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
freemind_wp_browser_project
- freemind_wp_browser