The VR Calendar plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.3. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to delete, and modify calendars as well as the plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/vr-calendar-sync/tags/2.3.2/Admin/Classes/VRCalendarAdmin.class.php#L133 | Patch Release Notes Third Party Advisory |
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2809350%40vr-calendar-sync&new=2809350%40vr-calendar-sync&sfp_email=&sfph_mail= | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3852 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-11-03T17:15:11.490Z
Updated:
Reserved: 2022-11-03T16:38:39.400Z
Link: CVE-2022-3852
JSON object: View
NVD Information
Status : Modified
Published: 2022-11-03T18:15:16.277
Modified: 2023-11-07T03:51:53.243
Link: CVE-2022-3852
JSON object: View
Redhat Information
No data.
CWE
No CWE.