A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199.
References
Link | Resource |
---|---|
https://vuldb.com/?id.216199 | Third Party Advisory |
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d | Patch Third Party Advisory |
https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-12-18 03:15
Updated : 2023-01-06 05:55
NVD link : CVE-2022-4604
Mitre link : CVE-2022-4604
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
wp-english-wp-admin_project
- wp-english-wp-admin