The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when creating and editing cursors, which could allow attackers to made a logged in admin perform such actions via CSRF attacks. Furthermore, due to the lack of sanitisation and escaping in some of the cursor options, it could also lead to Stored Cross-Site Scripting
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-10-17T00:00:00
Updated: 2022-10-17T00:00:00
Reserved: 2022-09-07T00:00:00
Link: CVE-2022-3149
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-10-17T12:15:10.340
Modified: 2022-10-21T16:39:21.067
Link: CVE-2022-3149
JSON object: View
Redhat Information
No data.