CVE-2013-2107
Published May 23, 2014
Last updated 10 years ago
Overview
- Description
- Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php. NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mail_on_update_project:mail_on_update:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "8D2C313D-5B68-49FC-9AD8-E8B4278DA9DC", "versionEndIncluding": "5.1.0" }, { "criteria": "cpe:2.3:a:mail_on_update_project:mail_on_update:5.0.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "044A8EBF-8E6D-4775-B216-6B9790BA5FFD" } ], "operator": "OR" } ] } ]