WordPress Plugin Vulnerabilities
Mashshare <= 2.3.0 - Information Disclosure
Description
The Mashshare plugin exposes a few AJAX commands via its own custom hook, which can be found in the file ‘includes/admin/admin-actions.php’, and the function ‘mashsb_process_actions’. This function is called upon the ‘admin_init’ action being fired, which can be triggered by anyone when visiting the admin AJAX handler. Coupled with the fact that there is no checking of user privilege on this function means that anonymous users are able to trigger certain functions intended for Administrative use only.
Proof of Concept
Affects Plugins
References
Miscellaneous
Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2015-04-17 (about 11 years ago)
Added
2015-04-25 (about 11 years ago)
Last Updated
2021-01-19 (about 5 years ago)