2023-06-30 16:00:38 +00:00
{
2023-07-01 04:00:39 +00:00
"data_version" : "4.0" ,
2023-06-30 16:00:38 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2021-4384" ,
2023-07-01 04:00:39 +00:00
"ASSIGNER" : "security@wordfence.com" ,
"STATE" : "PUBLIC"
2023-06-30 16:00:38 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2023-07-01 04:00:39 +00:00
"value" : "The WordPress Photo Gallery \u2013 Image Gallery plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on the load_images_thumbnail() and edit_gallery() functions. This makes it possible for unauthenticated attackers to edit galleries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "origincode" ,
"product" : {
"product_data" : [
{
"product_name" : "WordPress Photo Gallery \u2013 Image Gallery" ,
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
"version_name" : "*" ,
"version_value" : "1.0.6"
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1355bc94-7110-4d61-855e-78889e58dcad?source=cve" ,
"refsource" : "MISC" ,
"name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1355bc94-7110-4d61-855e-78889e58dcad?source=cve"
} ,
{
"url" : "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/"
} ,
{
"url" : "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/"
} ,
{
"url" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/"
} ,
{
"url" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/"
} ,
{
"url" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/"
} ,
{
"url" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/"
} ,
{
"url" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/" ,
"refsource" : "MISC" ,
"name" : "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/"
} ,
{
"url" : "https://plugins.trac.wordpress.org/browser/photo-contest/tags/1.0.6/includes/view/ajax-function.php#L559" ,
"refsource" : "MISC" ,
"name" : "https://plugins.trac.wordpress.org/browser/photo-contest/tags/1.0.6/includes/view/ajax-function.php#L559"
} ,
{
"url" : "https://plugins.trac.wordpress.org/browser/photo-contest/tags/1.0.6/includes/admin/admin-page-galleries.php#L102" ,
"refsource" : "MISC" ,
"name" : "https://plugins.trac.wordpress.org/browser/photo-contest/tags/1.0.6/includes/admin/admin-page-galleries.php#L102"
}
]
} ,
"credits" : [
{
"lang" : "en" ,
"value" : "Jerome Bruandet"
}
] ,
"impact" : {
"cvss" : [
{
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" ,
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM"
2023-06-30 16:00:38 +00:00
}
]
}
}