The Ecwid Ecommerce Shopping Cart WordPress plugin before 6.12.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - Exploit, Third Party Advisory |
23 Jan 2024, 14:47
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-16 16:15
Updated : 2025-06-02 15:15
NVD link : CVE-2023-6292
Mitre link : CVE-2023-6292
CVE.ORG link : CVE-2023-6292
JSON object : View
Products Affected
lightspeedhq
- ecwid_ecommerce_shopping_cart
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
