The Hustle (aka wordpress-popup) plugin 6.0.7 for WordPress is vulnerable to CSV Injection as it allows for injecting malicious code into a pop-up window. Successful exploitation grants an attacker with a right to execute malicious code on the administrator's computer through Excel functions as the plugin does not sanitize the user's input and allows insertion of any text.
References
Link | Resource |
---|---|
https://blog.reddy.io/2019/05/24/reddy-solutions-found-a-csv-injection-vulnerability-in-hustle-wordpress-plugin/ | Broken Link Exploit Third Party Advisory |
https://blog.reddy.io/category/cybersecurity/ | Broken Link Exploit Third Party Advisory |
https://wordpress.org/plugins/wordpress-popup/#developers | Release Notes |
https://wpvulndb.com/vulnerabilities/9326 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-29T18:15:52
Updated: 2019-08-02T12:06:05
Reserved: 2019-05-09T00:00:00
Link: CVE-2019-11872
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-05-29T19:29:00.407
Modified: 2023-02-24T19:33:16.963
Link: CVE-2019-11872
JSON object: View
Redhat Information
No data.
CWE