CVE-2021-4401
Style Kits <= 1.8.0 - Cross-Site Request Forgery Bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Style Kits plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.0. This is due to missing or incorrect nonce validation on the update_posts_stylekit() function. This makes it possible for unauthenticated attackers to update style kits for posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
El plugin Style Kits para WordPress es vulnerable a ataques de tipo Cross-Site Request Forgery (CSRF) en versiones hasta la 1.8.0 inlcusive. Esto es debido a la falta o incorrecta validación nonce en la función "update_posts_stylekit()". Esto hace posible que atacantes no autenticados actualicen los kits de estilo de las entradas a través de una solicitud manipulada y puedan engañar a un administrador del sitio para que realice una acción como hacer clic en un enlace.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-03-01 CVE Published
- 2023-06-30 CVE Reserved
- 2024-11-25 CVE Updated
- 2024-12-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (9)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://plugins.trac.wordpress.org/changeset/2473676/analogwp-templates/trunk/inc/class-quick-edit.php | 2023-11-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Analogwp Search vendor "Analogwp" | Style Kits Search vendor "Analogwp" for product "Style Kits" | <= 1.8.0 Search vendor "Analogwp" for product "Style Kits" and version " <= 1.8.0" | wordpress |
Affected
|