cve/2024/CVE-2024-6230.md

18 lines
887 B
Markdown
Raw Normal View History

2024-08-05 18:41:32 +00:00
### [CVE-2024-6230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6230)
![](https://img.shields.io/static/v1?label=Product&message=%D9%BE%D9%84%D8%A7%DA%AF%DB%8C%D9%86%20%D9%BE%D8%B1%D8%AF%D8%A7%D8%AE%D8%AA%20%D8%AF%D9%84%D8%AE%D9%88%D8%A7%D9%87&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The پلاگین پرداخت دلخواه WordPress plugin through 2.9.8 does not have CSRF check in place when resetting its form fields, which could allow attackers to make a logged in admin perform such action via a CSRF attack
### POC
#### Reference
- https://wpscan.com/vulnerability/311e3c15-0f58-4f3b-91f8-0c62c0eea55e/
#### Github
2024-08-11 18:44:53 +00:00
- https://github.com/20142995/nuclei-templates
2024-08-05 18:41:32 +00:00