WordPress Plugin Vulnerabilities
Patreon WordPress < 1.8.8 - Cross-Site Request Forgery
Description
The Patreon WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.7. This is due to missing or incorrect nonce validation on several functions in the ~/classes/patreon_wordpress.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings among other actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affects Plugins
References
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
BuShiYue
Verified
No
WPVDB ID
Timeline
Publicly Published
2023-11-07 (about 2 years ago)
Added
2023-11-23 (about 2 years ago)
Last Updated
2024-01-22 (about 2 years ago)