The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the ‘azh_add_post’, ‘azh_duplicate_post’, ‘azh_update_post’ and ‘azh_remove_post’ functions. This makes it possible for unauthenticated attackers to create, modify, and delete a post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CPE | Name | Operator | Version |
---|---|---|---|
page_builder_with_image_map_by_azexo | le | 1.27.133 |
plugins.trac.wordpress.org/browser/page-builder-by-azexo/trunk/azexo_html.php
plugins.trac.wordpress.org/browser/page-builder-by-azexo/trunk/azexo_html.php
plugins.trac.wordpress.org/browser/page-builder-by-azexo/trunk/azexo_html.php
plugins.trac.wordpress.org/browser/page-builder-by-azexo/trunk/azexo_html.php
plugins.trac.wordpress.org/browser/page-builder-by-azexo/trunk/azexo_html.php
www.wordfence.com/threat-intel/vulnerabilities/id/a4e26035-ce4e-4b4b-aa3c-cd86b29b199a?source=cve