{ "id": "CVE-2022-3154", "sourceIdentifier": "contact@wpscan.com", "published": "2022-10-10T21:15:11.510", "lastModified": "2024-11-21T07:18:56.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Woo Billingo Plus WordPress plugin before 4.4.5.4, Integration for Billingo & Gravity Forms WordPress plugin before 1.0.4, Integration for Szamlazz.hu & Gravity Forms WordPress plugin before 1.2.7 are lacking CSRF checks in various AJAX actions, which could allow attackers to make logged in Shop Managers and above perform unwanted actions, such as deactivate the plugin's license" }, { "lang": "es", "value": "El plugin Woo Billingo Plus de WordPress versiones anteriores a 4.4.5.4, el plugin Integration for Billingo & Gravity Forms de WordPress versiones anteriores a 1.0.4 y el plugin Integration for Szamlazz.hu & Gravity Forms de WordPress versiones anteriores a 1.2.7 carecen de comprobaciones de tipo CSRF en varias acciones AJAX, lo que podr\u00eda permitir a atacantes hacer que los administradores de tiendas registrados y superiores lleven a cabo acciones no deseadas, como desactivar la licencia del plugin" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", "baseScore": 7.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "LOW" }, "exploitabilityScore": 2.8, "impactScore": 4.2 } ] }, "weaknesses": [ { "source": "contact@wpscan.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-352" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:woo_billingo_plus_project:woo_billingo_plus:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.4.5.4", "matchCriteriaId": "DB344D27-D79B-4564-8EAC-0267B2586973" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:integration_for_billingo_\\&_gravity_forms_project:integration_for_billingo_\\&_gravity_forms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.0.4", "matchCriteriaId": "010CF706-3C08-4FDB-A08E-ACC4FFE2F5CA" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:integration_for_szamlazz.hu_\\&_gravity_forms_project:integration_for_szamlazz.hu_\\&_gravity_forms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.7", "matchCriteriaId": "51AA6F7C-B2A6-4FCD-A532-F23843D16B78" } ] } ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }