cve/2023/CVE-2023-3320.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3320)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Sticky%20Social&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation in the ~/admin/views/admin.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### POC
#### Reference
- http://packetstormsecurity.com/files/173048/WordPress-WP-Sticky-Social-1.0.1-CSRF-Cross-Site-Scripting.html
#### Github
No PoCs found on GitHub currently.