The Banner Cycler plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the pabc_admin_slides_postback() function found in the ~/admin/admin.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site’s administrator into performing an action such as clicking on a link
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/banner-cycler/trunk/admin/admin.php#L131 | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc1d7f2-053d-42d4-afb7-6fb69fd71b91?source=cve | Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2233 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-09-06 18:15
Updated : 2023-11-07 03:46
NVD link : CVE-2022-2233
Mitre link : CVE-2022-2233
CVE.ORG link : CVE-2022-2233
JSON object : View
Products Affected
banner_cycler_project
- banner_cycler
CWE
CWE-352
Cross-Site Request Forgery (CSRF)