Total
5841 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-6503 | 1 Paulgriffinpetty | 1 Wp Plugin Lister | 2024-02-03 | N/A | 5.4 MEDIUM |
The WP Plugin Lister WordPress plugin through 2.1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | |||||
CVE-2023-7074 | 1 Giovambattistafazioli | 1 Wp Social Bookmark Menu | 2024-02-03 | N/A | 8.8 HIGH |
The WP SOCIAL BOOKMARK MENU WordPress plugin through 1.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. | |||||
CVE-2023-6946 | 1 Unalignedcode | 1 Autotitle | 2024-02-03 | N/A | 8.8 HIGH |
The Autotitle for WordPress plugin through 1.0.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. | |||||
CVE-2024-22143 | 1 Wpspellcheck | 1 Wpspellcheck | 2024-02-03 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in WP Spell Check.This issue affects WP Spell Check: from n/a through 9.17. | |||||
CVE-2024-22285 | 1 Elisebosse | 1 Frontpage Manager | 2024-02-03 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in Elise Bosse Frontpage Manager.This issue affects Frontpage Manager: from n/a through 1.3. | |||||
CVE-2024-22291 | 1 Marcomilesi | 1 Browser Theme Color | 2024-02-03 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi Browser Theme Color.This issue affects Browser Theme Color: from n/a through 1.3. | |||||
CVE-2024-22304 | 1 Borbis | 1 Freshmail For Wordpress | 2024-02-03 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in Borbis Media FreshMail For WordPress.This issue affects FreshMail For WordPress: from n/a through 2.3.2. | |||||
CVE-2024-22140 | 1 Cozmoslabs | 1 Profile Builder | 2024-02-03 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Profile Builder Pro.This issue affects Profile Builder Pro: from n/a through 3.10.0. | |||||
CVE-2023-6391 | 1 Jeremiahorem | 1 Custom User Css | 2024-02-02 | N/A | 8.8 HIGH |
The Custom User CSS WordPress plugin through 0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. | |||||
CVE-2023-6633 | 1 Sidenotesproject | 1 Side Notes | 2024-02-02 | N/A | 4.3 MEDIUM |
The Site Notes WordPress plugin through 2.0.0 does not have CSRF checks in some of its functionalities, which could allow attackers to make logged in users perform unwanted actions, such as deleting administration notes, via CSRF attacks | |||||
CVE-2023-42270 | 1 Grocy Project | 1 Grocy | 2024-02-02 | N/A | 8.8 HIGH |
Grocy <= 4.0.2 is vulnerable to Cross Site Request Forgery (CSRF). | |||||
CVE-2023-45629 | 1 Wpdevart | 1 Gallery - Image And Video Gallery With Thumbnails | 2024-02-01 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 versions. | |||||
CVE-2023-25832 | 1 Esri | 1 Portal For Arcgis | 2024-02-01 | N/A | 8.8 HIGH |
There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.0 and below that may allow an attacker to trick an authorized user into executing unwanted actions. | |||||
CVE-2024-0667 | 1 10web | 1 Form Maker | 2024-02-01 | N/A | 6.3 MEDIUM |
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.15.21. This is due to missing or incorrect nonce validation on the 'execute' function. This makes it possible for unauthenticated attackers to execute arbitrary methods in the 'BoosterController' class via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |||||
CVE-2024-22424 | 1 Linuxfoundation | 1 Argo-cd | 2024-01-31 | N/A | 8.3 HIGH |
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The Argo CD API prior to versions 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15 are vulnerable to a cross-server request forgery (CSRF) attack when the attacker has the ability to write HTML to a page on the same parent domain as Argo CD. A CSRF attack works by tricking an authenticated Argo CD user into loading a web page which contains code to call Argo CD API endpoints on the victim’s behalf. For example, an attacker could send an Argo CD user a link to a page which looks harmless but in the background calls an Argo CD API endpoint to create an application running malicious code. Argo CD uses the “Lax” SameSite cookie policy to prevent CSRF attacks where the attacker controls an external domain. The malicious external website can attempt to call the Argo CD API, but the web browser will refuse to send the Argo CD auth token with the request. Many companies host Argo CD on an internal subdomain. If an attacker can place malicious code on, for example, https://test.internal.example.com/, they can still perform a CSRF attack. In this case, the “Lax” SameSite cookie does not prevent the browser from sending the auth cookie, because the destination is a parent domain of the Argo CD API. Browsers generally block such attacks by applying CORS policies to sensitive requests with sensitive content types. Specifically, browsers will send a “preflight request” for POSTs with content type “application/json” asking the destination API “are you allowed to accept requests from my domain?” If the destination API does not answer “yes,” the browser will block the request. Before the patched versions, Argo CD did not validate that requests contained the correct content type header. So an attacker could bypass the browser’s CORS check by setting the content type to something which is considered “not sensitive” such as “text/plain.” The browser wouldn’t send the preflight request, and Argo CD would happily accept the contents (which are actually still JSON) and perform the requested action (such as running malicious code). A patch for this vulnerability has been released in the following Argo CD versions: 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15. The patch contains a breaking API change. The Argo CD API will no longer accept non-GET requests which do not specify application/json as their Content-Type. The accepted content types list is configurable, and it is possible (but discouraged) to disable the content type check completely. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |||||
CVE-2024-0624 | 1 Strangerstudios | 1 Paid Memberships Pro | 2024-01-31 | N/A | 5.3 MEDIUM |
The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.12.7. This is due to missing or incorrect nonce validation on the pmpro_update_level_order() function. This makes it possible for unauthenticated attackers to update the order of levels via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |||||
CVE-2024-23902 | 1 Jenkins | 1 Github Branch Source | 2024-01-31 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL. | |||||
CVE-2023-35793 | 1 Cassianetworks | 1 Access Controller | 2024-01-29 | N/A | 8.8 HIGH |
An issue was discovered in Cassia Access Controller 2.1.1.2303271039. Establishing a web SSH session to gateways is vulnerable to Cross Site Request Forgery (CSRF) attacks. | |||||
CVE-2024-22416 | 1 Pyload-ng Project | 1 Pyload-ng | 2024-01-29 | N/A | 8.8 HIGH |
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade. | |||||
CVE-2023-6625 | 1 Gravitymaster | 1 Product Enquiry For Woocommerce | 2024-01-26 | N/A | 4.3 MEDIUM |
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not have a CSRF check in place when deleting inquiries, which could allow attackers to make a logged in admin delete them via a CSRF attack |