Cross-Site Request Forgery in Dokan Plugin for WordPress
CVE-2020-36748
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 1 July 2023
Summary
The Dokan plugin for WordPress is susceptible to Cross-Site Request Forgery due to inadequate nonce validation in the handle_order_export() function. This flaw allows unauthenticated attackers to manipulate order exports by tricking a site administrator into executing an unintended action, such as clicking a malicious link, thereby exposing sensitive order information.
Affected Version(s)
Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy * < 3.0.9
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jerome Bruandet