6.8 Medium
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
75.1%
Multiple cross-site request forgery (CSRF) vulnerabilities in the Disqus Comment System plugin before 2.76 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) disqus_replace, (2) disqus_public_key, or (3) disqus_secret_key parameter to wp-admin/edit-comments.php in manage.php or that (4) reset or (5) delete plugin options via the reset parameter to wp-admin/edit-comments.php.
packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html
packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
seclists.org/fulldisclosure/2014/Aug/35
www.exploit-db.com/exploits/34336
www.securityfocus.com/bid/69205
exchange.xforce.ibmcloud.com/vulnerabilities/95288
exchange.xforce.ibmcloud.com/vulnerabilities/95289
gist.github.com/nikcub/cb5dc7a5464276c8424a
wordpress.org/plugins/disqus-comment-system/other_notes
www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin