WordPress Plugin Vulnerabilities

Mashshare <= 2.3.0 - Information Disclosure

Description

The Mashshare plugin exposes a few AJAX commands via its own custom hook, which can be found in the file ‘includes/admin/admin-actions.php’, and the function ‘mashsb_process_actions’. This function is called upon the ‘admin_init’ action being fired, which can be triggered by anyone when visiting the admin AJAX handler. Coupled with the fact that there is no checking of user privilege on this function means that anonymous users are able to trigger certain functions intended for Administrative use only.

Proof of Concept

Affects Plugins

Fixed in 2.3.1

References

Miscellaneous

Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2015-04-17 (about 11 years ago)
Added
2015-04-25 (about 11 years ago)
Last Updated
2021-01-19 (about 5 years ago)

Other