cvelist/2021/24xxx/CVE-2021-24989.json

75 lines
1.9 KiB
JSON
Raw Normal View History

2021-01-14 16:02:56 +00:00
{
2022-01-24 08:58:22 +01:00
"CVE_data_meta": {
"ID": "CVE-2021-24989",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Accept Donations with PayPal < 1.3.4 - Arbitrary Post Deletion via CSRF"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Accept Donations with PayPal",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.3.4",
"version_value": "1.3.4"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Accept Donations with PayPal WordPress plugin before 1.3.4 does not have CSRF check in place and does not ensure that the post to be deleted belongs to the plugin, allowing attackers to make a logged in admin delete arbitrary posts from the blog"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/82c2ead1-1d3c-442a-ae68-359a4748447f",
"name": "https://wpscan.com/vulnerability/82c2ead1-1d3c-442a-ae68-359a4748447f"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "eng"
}
2021-01-14 16:02:56 +00:00
]
2022-01-24 08:58:22 +01:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Krzysztof Zając"
2021-01-14 16:02:56 +00:00
}
2022-01-24 08:58:22 +01:00
],
"source": {
"discovery": "EXTERNAL"
}
2021-01-14 16:02:56 +00:00
}