Vulnerability Details : CVE-2015-2293
Multiple cross-site request forgery (CSRF) vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote attackers to hijack the authentication of certain users for requests that conduct SQL injection attacks via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page.
Vulnerability category: Sql InjectionCross-site request forgery (CSRF)
Products affected by CVE-2015-2293
- cpe:2.3:a:yoast:wordpress_seo:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.6.2:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.6.3:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.7.3:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.7.3.1:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.6.0:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.6.1:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.7.3.2:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.7.3.3:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.7.1:*:*:*:*:wordpress:*:*
- cpe:2.3:a:yoast:wordpress_seo:1.7.2:*:*:*:*:wordpress:*:*
Threat overview for CVE-2015-2293
Top countries where our scanners detected CVE-2015-2293
Top open port discovered on systems with this issue
80
IPs affected by CVE-2015-2293 71
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-2293!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-2293
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2293
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2015-2293
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2293
-
https://yoast.com/wordpress-seo-security-release/
WordPress SEO Security release • YoastVendor Advisory
-
https://wpvulndb.com/vulnerabilities/7841
Yoast SEO <= 1.7.3.3 - Blind SQL Injection
-
http://seclists.org/fulldisclosure/2015/Mar/73
Full Disclosure: WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL InjectionExploit
-
https://wordpress.org/plugins/wordpress-seo/changelog/
Yoast SEO – WordPress plugin | WordPress.org
-
http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html
WordPress SEO By Yoast 1.7.3.3 SQL Injection ≈ Packet StormExploit
-
http://www.securitytracker.com/id/1031920
Yoast WordPress SEO WordPress Plugin Access Control Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTrackerExploit
Jump to