CVE-2023-37889
WordPress WPAdmin AWS CDN Plugin <= 2.0.13 is vulnerable to Cross Site Request Forgery (CSRF)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Cross-Site Request Forgery (CSRF) vulnerability in WPAdmin WPAdmin AWS CDN plugin <= 2.0.13 versions.
The WPAdmin AWS CDN plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.13. This is due to missing nonce validation on several functions called via AJAX actions in the /admin/class-aws-cdn-admin.php file. This makes it possible for unauthenticated attackers to perform several unauthorized actions like managing cdn, certificate, domain, and exclusion settings for the plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Cross-Site Request Forgery (CSRF) vulnerability in WPAdmin WPAdmin AWS CDN plugin <= 2.0.13 versions.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-07-10 CVE Reserved
- 2023-07-11 CVE Published
- 2024-09-30 CVE Updated
- 2024-12-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
- CAPEC-62: Cross Site Request Forgery
References (1)
URL | Tag | Source |
---|---|---|
https://patchstack.com/database/vulnerability/aws-cdn-by-wpadmin/wordpress-wpadmin-aws-cdn-plugin-2-0-13-cross-site-request-forgery-csrf?_s_id=cve | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|