CVE-2022-1421
Discy < 5.2 - Settings Update via CSRF
Severity Score
4.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The Discy WordPress theme before 5.2 lacks CSRF checks in some AJAX actions, allowing an attacker to make a logged in admin change arbitrary 's settings including payment methods via a CSRF attack
El tema Discy de WordPress versiones anteriores a 5.2, carece de comprobaciones de tipo CSRF en algunas acciones AJAX, lo que permite a un atacante hacer que un administrador conectado cambie la configuración arbitraria, incluyendo los métodos de pago, por medio de un ataque de tipo CSRF
*Credits:
Bibek Neupane
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-04-21 CVE Reserved
- 2022-05-16 CVE Published
- 2022-11-01 First Exploit
- 2023-12-28 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/nb1b3k/CVE-2022-1421 | 2022-11-01 | |
https://wpscan.com/vulnerability/a7a24e8e-9056-4967-bcad-b96cc0c5b249 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|