Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
References
Link | Resource |
---|---|
https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/wordpress-subscribe-to-comments-reloaded-plugin-211130-multiple-cross-site-request-forgery-csrf-vulnerabilities | Third Party Advisory |
https://wordpress.org/plugins/subscribe-to-comments-reloaded/ | Product Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Patchstack
Published: 2022-04-29T00:00:00
Updated: 2022-04-29T16:41:11
Reserved: 2022-04-18T00:00:00
Link: CVE-2022-29414
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-29T17:15:22.657
Modified: 2022-05-10T18:55:48.337
Link: CVE-2022-29414
JSON object: View
Redhat Information
No data.
CWE