The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on the 'imgmap_save_area_title' function. This makes it possible for unauthenticated attackers to update the post title and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () https://plugins.trac.wordpress.org/browser/imagemapper/tags/1.2.6/imagemapper.php#L894 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb67f02-87e8-4ca3-8a9d-6663a700ab5b?source=cve - Third Party Advisory |
Information
Published : 2023-11-07 11:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5532
Mitre link : CVE-2023-5532
CVE.ORG link : CVE-2023-5532
JSON object : View
Products Affected
imagemapper_project
- imagemapper
CWE
CWE-352
Cross-Site Request Forgery (CSRF)