Cross-Site Request Forgery Vulnerability in WP Activity Log by WordPress
CVE-2023-2286

4.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
9 June 2023

Summary

The WP Activity Log plugin for WordPress is susceptible to Cross-Site Request Forgery due to inadequate nonce validation within the ajax_run_cleanup function. This vulnerability allows unauthenticated attackers to exploit the flaw by tricking an administrator into executing a forged request. Such an attack could enable unauthorized actions on the affected WordPress site, posing significant security risks if not addressed in the plugin versions up to and including 4.5.0.

Affected Version(s)

WP Activity Log * <= 4.5.0

WP Activity Log Premium * <= 4.5.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marco Wotschka
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.