CVE-2021-24806
wpDiscuz < 7.3.4 - Arbitrary Comment Addition/Edition/Deletion via CSRF
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment.
El plugin wpDiscuz de WordPress versiones anteriores a 7.3.4, no comprueba la existencia de CSRF cuando se añaden, editan y eliminan comentarios, lo que podría permitir a un atacante hacer que usuarios registrados, como el administrador, editen y eliminen un comentario arbitrario, o que el usuario que hizo el comentario lo edite por medio de un ataque CSRF. Los atacantes también podrían hacer que usuarios que han iniciado sesión publiquen comentarios arbitrarios
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-14 CVE Reserved
- 2021-10-11 CVE Published
- 2024-06-14 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/2746101e-e993-42b9-bd6f-dfd5544fa3fe | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gvectors Search vendor "Gvectors" | Wpdiscuz Search vendor "Gvectors" for product "Wpdiscuz" | < 7.3.4 Search vendor "Gvectors" for product "Wpdiscuz" and version " < 7.3.4" | wordpress |
Affected
|