// For flags

CVE-2014-7957

Pods <= 2.4.3 - Multiple Cross-Site Request Forgery

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple cross-site request forgery (CSRF) vulnerabilities in the Pods plugin before 2.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) conduct cross-site scripting (XSS) attacks via the toggled parameter in a toggle action in the pods-components page to wp-admin/admin.php, (2) delete a pod in a delete action in the pods page to wp-admin/admin.php, (3) reset pod settings and data via the pods_reset parameter in the pod-settings page to wp-admin/admin.php, (4) deactivate and reset pod data via the pods_reset_deactivate parameter in the pod-settings page to wp-admin/admin.php, (5) delete the admin role via the id parameter in a delete action in the pods-component-roles-and-capabilities page to wp-admin/admin.php, or (6) enable "roles and capabilities" in a toggle action in the pods-components page to wp-admin/admin.php.

Múltiples vulnerabilidades de CSRF en el plugin Pods anterior a 2.5 para WordPress permiten a atacantes remotos secuestrar la autenticación de administradores para solicitudes que (1) realizan ataques de XSS a través del parámetro toggled en una acción toggle en la página de componentes de pods en wp-admin/admin.php, (2) eliminan un pod en una acción de eliminación en la página de pods en wp-admin/admin.php, (3) reconfiguran las configuraciones y datos de pods a través del parámetro pods_reset en la página de las configuraciones de pods en wp-admin/admin.php, (4) desactivan y reconfiguran datos de pods a través del parámetro pods_reset_deactivate en la página de configuraciones de pods en wp-admin/admin.php, (5) eliminan el rol de administración a través del parámetro id en una acción de eliminación en la página de roles y capacidades de los componentes de pods en wp-admin/admin.php, o (6) habilitan rols y capacidades en una acción toggle en la página de componentes de pods en wp-admin/admin.php.

WordPress Pods plugin versions 2.4.3 and below suffer from cross site request forgery and cross site scripting vulnerabilities.

*Credits: Pietro Oliva
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-10-07 CVE Reserved
  • 2015-01-12 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pods Foundation
Search vendor "Pods Foundation"
Pods
Search vendor "Pods Foundation" for product "Pods"
<= 2.4.3
Search vendor "Pods Foundation" for product "Pods" and version " <= 2.4.3"
wordpress
Affected