WordPress Plugin Vulnerabilities
WP Headers And Footers < 3.1.2 - Arbitrary Options Update via CSRF
Description
The plugin is vulnerable to Cross-Site Request Forgery due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability.
Affects Plugins
References
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Carlos Ferreira
Verified
No
WPVDB ID
Timeline
Publicly Published
2025-04-18 (about 1 year ago)
Added
2025-04-21 (about 1 year ago)
Last Updated
2025-04-21 (about 1 year ago)