Cross-Site Request Forgery Vulnerability in Subscribe To Comments Reloaded Plugin for WordPress
CVE-2014-2274
8.8HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 19 March 2018
Summary
A Cross-Site Request Forgery (CSRF) vulnerability exists in the Subscribe To Comments Reloaded plugin prior to version 140219 for WordPress. This flaw enables remote attackers to exploit the authentication of administrators, allowing them to send unauthorized requests that can lead to Cross-Site Scripting (XSS) attacks. By targeting the subscribe-to-comments-reloaded/options/index.php endpoint on the wp-admin/admin.php page, malicious actors can compromise the integrity of a WordPress site and execute harmful scripts.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved