1 results (0.009 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The DN Popup WordPress plugin through 1.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack El complemento DN Popup de WordPress hasta la versión 1.2.2 no tiene una verificación CSRF activada al actualizar sus configuraciones, lo que podría permitir a los atacantes hacer que un administrador que haya iniciado sesión las cambie mediante un ataque CSRF. The DN Popup plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.2. This is due to missing or incorrect nonce validation on the dn_popup_save() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/1f941d51-1eaf-424a-95b8-ccaa3fdd339b • CWE-352: Cross-Site Request Forgery (CSRF) •