A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199.
References
Link | Resource |
---|---|
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d | Patch Third Party Advisory |
https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2 | Patch Third Party Advisory |
https://vuldb.com/?id.216199 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2022-12-18T00:00:00
Updated: 2022-12-24T21:18:45.118Z
Reserved: 2022-12-18T00:00:00
Link: CVE-2022-4604
JSON object: View
NVD Information
Status : Modified
Published: 2022-12-18T11:15:11.170
Modified: 2024-05-17T02:16:49.670
Link: CVE-2022-4604
JSON object: View
Redhat Information
No data.
CWE