Cross-Site Request Forgery Vulnerability in BEAR Plugin for WordPress
CVE-2023-4940

4.3MEDIUM

Key Information:

Summary

The BEAR plugin for WordPress is susceptible to a Cross-Site Request Forgery flaw, allowing unauthenticated attackers to manipulate product data. This vulnerability arises from the failure in nonce validation within the woobe_bulkoperations_swap function, enabling attackers to initiate unauthorized actions on behalf of site administrators. If an administrator clicks on a specially crafted link, it could lead to potential exploitation of the website.

Affected Version(s)

BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net * <= 1.1.3.3

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marco Wotschka
.