WordPress Plugin Vulnerabilities
Stream < 4.0.2 - Cross-Site Request Forgery to Arbitrary Options Update
Description
The Stream plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.1. This is due to missing or incorrect nonce validation on the network_options_action() function. This makes it possible for unauthenticated attackers to update arbitrary options that can lead to DoS or privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affects Plugins
References
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
vgo0
Verified
No
WPVDB ID
Timeline
Publicly Published
2024-09-12 (about 1 year ago)
Added
2024-09-12 (about 1 year ago)
Last Updated
2024-09-13 (about 1 year ago)