Cross-Site Request Forgery in ImageInject Plugin for WordPress
CVE-2018-5285
8.8HIGH
Summary
The ImageInject plugin version 1.15 for WordPress is susceptible to a CSRF vulnerability through the wp-admin/options-general.php endpoint. This flaw allows attackers to exploit the lack of proper verification mechanisms, potentially enabling unauthorized actions to be performed without the user's consent. Users are encouraged to upgrade to a patched version and follow best practices for WordPress security to mitigate any associated risks.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved