Vulnerability Details : CVE-2021-24380
The Shantz WordPress QOTD WordPress plugin through 1.2.2 is lacking any CSRF check when updating its settings, allowing attackers to make logged in administrators change them to arbitrary values.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2021-24380
- Shantz Wordpress Qotd Project » Shantz Wordpress Qotd » For WordpressVersions up to, including, (<=) 1.2.2cpe:2.3:a:shantz_wordpress_qotd_project:shantz_wordpress_qotd:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-24380
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-24380
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2021-24380
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by:
- contact@wpscan.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2021-24380
-
https://wpscan.com/vulnerability/1dd0f9a8-22ab-4ecc-a925-605822739000
Attention Required! | CloudflareExploit;Third Party Advisory
Jump to