The video carousel slider with lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the responsive_video_gallery_with_lightbox_video_management_func() function. This makes it possible for unauthenticated attackers to delete videos hosted from the video slider via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/wp-plugins/wp-responsive-video-gallery-with-lightbox/blob/master/wp-responsive-video-gallery-with-lightbox.php - Exploit | |
References | () https://plugins.trac.wordpress.org/browser/wp-responsive-video-gallery-with-lightbox/tags/1.0.1/wp-responsive-video-gallery-with-lightbox.php - Patch, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/dc052b00-65a7-4668-8bdd-b06d69d12a4a?source=cve - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
Information
Published : 2023-11-03 13:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5945
Mitre link : CVE-2023-5945
CVE.ORG link : CVE-2023-5945
JSON object : View
Products Affected
i13websolution
- video_carousel_slider_with_lightbox
CWE
CWE-352
Cross-Site Request Forgery (CSRF)