Cross-Site Request Forgery Vulnerability in WP Directory Kit Plugin for WordPress
CVE-2023-2279

5.4MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
31 August 2023

Summary

The WP Directory Kit plugin for WordPress contains a vulnerability that allows unauthenticated attackers to execute unauthorized actions through Cross-Site Request Forgery. Due to improper nonce validation in the 'admin_page_display' function, attackers can manipulate plugin settings, import demo data, and alter Directory Kit-related content by tricking site administrators into clicking on malicious links. Initial patches addressed part of the issue in versions 1.2.0 and 1.2.1, but full resolution was achieved in version 1.2.2.

Affected Version(s)

WP Directory Kit * <= 1.2.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lana Codes
.