An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The live editor feature did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The live_editor_panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/siteorigin-panels/#developers | Release Notes Third Party Advisory |
https://www.wordfence.com/blog/2020/05/vulnerabilities-patched-in-page-builder-by-siteorigin-affects-over-1-million-sites/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-05-28T03:11:48
Updated: 2020-05-28T03:11:48
Reserved: 2020-05-27T00:00:00
Link: CVE-2020-13643
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-05-28T04:15:13.237
Modified: 2020-05-28T19:24:45.637
Link: CVE-2020-13643
JSON object: View
Redhat Information
No data.
CWE