WordPress Email Queue 1.0.0 Cross Site Request Forgery

Credit: Madhu Akula
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

Plugin Name : Email Queue A8-Cross-Site_Request_Forgery_(CSRF) Effected Version : 1.0.0 (and most probably lower version's if any) Vulnerability : A8-Cross-Site Request Forgery (CSRF) Identified by : Madhu Akula Technical Details Minimum Level of Access Required : Unauthenticated PoC - (Proof of Concept) : We can Remove Plugin from Queue by using following link, the plugin_id[]= you can put which number you want to remove[]=1&plugin_status=all We can request a plugin to queue from removed plugins by using following URL, change the plugin_id to effect other[]=1&plugin_status=not_in_queue Fixed in : 1.0.1 http://wordpress.org/plugins/email-queue/changelog/ Disclosure Timeline Vendor Contacted : 2014-08-04 Plugin Status : Updated on 2014-08-04 Public Disclosure : October 3, 2015 CVE Number : Not assigned yet Plugin Description : The plugin works with plugins produced by BestWebSoft team only. You can assign priorities to plugins that send mail. There are three levels of priority. It gives you an opportunity to organize a simple and effective mail queue. You can manage outgoing messages: trash them or delete completely. You can use searching, filtering and bulk operations with your mail. You have an option to remove any of mail-capable plugin from this plugin's queue.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com


Back to Top