cve/2022/CVE-2022-2260.md

18 lines
975 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2260)
![](https://img.shields.io/static/v1?label=Product&message=GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.21.3%3C%202.21.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The GiveWP WordPress plugin before 2.21.3 does not have CSRF in place when exporting data, and does not validate the exporting parameters such as dates, which could allow attackers to make a logged in admin DoS the web server via a CSRF attack as the plugin will try to retrieve data from the database many times which leads to overwhelm the target's CPU.
### POC
#### Reference
- https://wpscan.com/vulnerability/831b3afa-8fa3-4cb7-8374-36d0c368292f
#### Github
No PoCs found on GitHub currently.