WordPress Floating Action Button Plugin <=1.2.1 is vulnerable to Cross Site Request Forgery (CSRF)
CVE-2023-31088
8.8HIGH
Summary
A Cross-Site Request Forgery (CSRF) vulnerability exists in the Faraz Quazi Floating Action Button plugin affecting versions 1.2.1 and below. This flaw allows attackers to trick users into executing unwanted actions on a web application where they are authenticated, potentially compromising user accounts and data. It is crucial for users of this plugin to implement security measures to prevent exploitation of the vulnerability.
Affected Version(s)
Floating Action Button <= 1.2.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Yuki Haruma (Patchstack Alliance)