cve/2022/CVE-2022-29414.md

18 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-29414](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29414)
![](https://img.shields.io/static/v1?label=Product&message=Subscribe%20To%20Comments%20Reloaded%20(WordPress%20plugin)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%20211130%3C%3D%20211130%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/karimhabush/cyberowl