CVE-2022-4426
Mautic Integration For WooCommerce < 1.0.3 - Arbitrary Options Update via CSRF
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Mautic Integration for WooCommerce WordPress plugin before 1.0.3 does not have proper CSRF check when updating settings, and does not ensure that the options to be updated belong to the plugin, allowing attackers to make a logged in admin change arbitrary blog options via a CSRF attack.
The Mautic Integration for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, but not including, 1.0.3. This is due to missing or incorrect nonce validation when updating plugin settings. Further, the options being updated are not checked properly to restrict them to the plugin's own settings. This makes it possible for unauthenticated attackers to change arbitrary WordPress options granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-12-12 CVE Reserved
- 2022-12-20 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wpswings Search vendor "Wpswings" | Mautic Integration For Woocommerce Search vendor "Wpswings" for product "Mautic Integration For Woocommerce" | < 1.0.3 Search vendor "Wpswings" for product "Mautic Integration For Woocommerce" and version " < 1.0.3" | wordpress |
Affected
|