Cross-Site Request Forgery Vulnerability in WP Directory Kit Plugin for WordPress
CVE-2023-2279
5.4MEDIUM
Summary
The WP Directory Kit plugin for WordPress contains a vulnerability that allows unauthenticated attackers to execute unauthorized actions through Cross-Site Request Forgery. Due to improper nonce validation in the 'admin_page_display' function, attackers can manipulate plugin settings, import demo data, and alter Directory Kit-related content by tricking site administrators into clicking on malicious links. Initial patches addressed part of the issue in versions 1.2.0 and 1.2.1, but full resolution was achieved in version 1.2.2.
Affected Version(s)
WP Directory Kit * <= 1.2.1
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lana Codes