Cross-Site Request Forgery Vulnerability in Ocean Extra Plugin for WordPress
CVE-2020-36760
4.3MEDIUM
Summary
The Ocean Extra plugin for WordPress has a Cross-Site Request Forgery vulnerability in all versions up to and including 1.6.5. This issue arises from missing or improper nonce validation within the add_core_extensions_bundle_validation() function. As a result, unauthenticated attackers could exploit this flaw by crafting a forged request. If they successfully deceive an administrator into clicking a malicious link, they may be able to validate extension bundles without authorization, thereby compromising the security of the WordPress site.
Affected Version(s)
Ocean Extra * < 1.6.6
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jerome Bruandet