mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
29 lines
1.3 KiB
JSON
29 lines
1.3 KiB
JSON
{
|
|
"id": "CVE-2023-7202",
|
|
"sourceIdentifier": "contact@wpscan.com",
|
|
"published": "2024-02-27T09:15:37.397",
|
|
"lastModified": "2024-02-27T14:20:06.637",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Fatal Error Notify WordPress plugin before 1.5.3 does not have authorisation and CSRF checks in its test_error AJAX action, allowing any authenticated users, such as subscriber to call it and spam the admin email address with error messages. The issue is also exploitable via CSRF"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento Fatal Error Notify de WordPress anterior a 1.5.3 no tiene autorizaci\u00f3n y CSRF verifica su acci\u00f3n test_error AJAX, lo que permite a cualquier usuario autenticado, como un suscriptor, llamarlo y enviar spam a la direcci\u00f3n de correo electr\u00f3nico del administrador con mensajes de error. El problema tambi\u00e9n se puede explotar a trav\u00e9s de CSRF."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/",
|
|
"source": "contact@wpscan.com"
|
|
},
|
|
{
|
|
"url": "https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65b375a/",
|
|
"source": "contact@wpscan.com"
|
|
}
|
|
]
|
|
} |