CVE-2023-2352
Discription
The CHP Ads Block Detector plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.9.4. This is due to missing or incorrect nonce validation on the chp_abd_action function. This makes it possible for unauthenticated attackers to update or reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.Read More
References
https://plugins.trac.wordpress.org/changeset/2926660/chp-ads-block-detectorhttps://plugins.trac.wordpress.org/changeset/2920522/chp-ads-block-detectorhttps://www.wordfence.com/threat-intel/vulnerabilities/id/e5a9cced-0e5e-4b6e-8291-0a862c9f9523?source=cvehttps://plugins.trac.wordpress.org/changeset/2922313/chp-ads-block-detectorCVSS2
- Access Vector
- Access Complexity
- Authentication
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Medium
- None
- None
- Partial
- None
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
- Attack Vector
- Attack Complexity
- Privileges Required
- User Interaction
- Scope
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Low
- None
- Required
- Unchanged
- None
- Low
- None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Back to Main