The Copify plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.0. This is due to missing nonce validation on the CopifySettings page. This makes it possible for unauthenticated attackers to update the plugins settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://www.wordfence.com/threat-intel/vulnerabilities/id/e92c6374-d11d-458c-b089-0ee79c33e4a6?source=cve | Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1900 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-06-13T12:47:42
Updated: 2023-10-20T15:06:24.413Z
Reserved: 2022-05-26T00:00:00
Link: CVE-2022-1900
JSON object: View
NVD Information
Status : Modified
Published: 2022-06-13T13:15:13.287
Modified: 2023-11-07T03:42:17.007
Link: CVE-2022-1900
JSON object: View
Redhat Information
No data.
CWE