### [CVE-2022-1790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1790) ![](https://img.shields.io/static/v1?label=Product&message=New%20User%20Email%20Set%20Up&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0.5.2%3C%3D%200.5.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) ### Description The New User Email Set Up WordPress plugin through 0.5.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack ### POC #### Reference - https://wpscan.com/vulnerability/176d5761-4f01-4173-a70c-6052a6a9963e #### Github No PoCs found on GitHub currently.