WordPress Plugin Vulnerabilities
Gutenberg & Elementor Templates Importer For Responsive < 2.2.6 - Unprotected AJAX Endpoints
Description
These flaws allowed any authenticated user, regardless of privilege level, the ability to execute various AJAX actions (23) that could reset site data, inject malicious JavaScript in pages, modify theme customizer data, import .xml and .json files, and activate plugins, among many other actions.
Proof of Concept
Affects Plugins
References
Miscellaneous
Original Researcher
Chloe Chamberland
Submitter
Chloe
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2020-03-18 (about 6 years ago)
Added
2020-03-18 (about 6 years ago)
Last Updated
2020-04-24 (about 6 years ago)