Cross-Site Request Forgery in Dokan Plugin for WordPress
CVE-2020-36748

4.3MEDIUM

Summary

The Dokan plugin for WordPress is susceptible to Cross-Site Request Forgery due to inadequate nonce validation in the handle_order_export() function. This flaw allows unauthenticated attackers to manipulate order exports by tricking a site administrator into executing an unintended action, such as clicking a malicious link, thereby exposing sensitive order information.

Affected Version(s)

Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy * < 3.0.9

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jerome Bruandet
.