cve/2023/CVE-2023-3178.md

18 lines
808 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-3178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3178)
![](https://img.shields.io/static/v1?label=Product&message=POST%20SMTP%20Mailer&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.5.0%3C%202.5.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack.
### POC
#### Reference
- https://wpscan.com/vulnerability/5341cb5d-d204-49e1-b013-f8959461995f/
#### Github
No PoCs found on GitHub currently.