The ToolBar to Share plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0. This is due to missing nonce validation on the plugin_toolbar_comparte page. This makes it possible for unauthenticated attackers to update the plugins settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/toolbar-to-share/trunk/toolbartoshare.php | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/fbda7670-179a-41ed-8ec9-ae7f5102e645?source=cve | |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1918 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-06-13 13:15
Updated : 2024-01-11 09:15
NVD link : CVE-2022-1918
Mitre link : CVE-2022-1918
CVE.ORG link : CVE-2022-1918
JSON object : View
Products Affected
toolbar_to_share_project
- toolbar_to_share
CWE
CWE-352
Cross-Site Request Forgery (CSRF)