Vulnerability Details : CVE-2021-4427
Potential exploit
The Vuukle Comments, Reactions, Share Bar, Revenue plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.31. This is due to missing or incorrect nonce validation in the /admin/partials/free-comments-for-wordpress-vuukle-admin-display.php file. This makes it possible for unauthenticated attackers to edit the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2021-4427
- Vuukle » Vuukle Comments, Reactions, Share Bar, Revenue » For WordpressVersions up to, including, (<=) 3.4.31cpe:2.3:a:vuukle:vuukle_comments\,_reactions\,_share_bar\,_revenue:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-4427
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-4427
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
Wordfence |
CWE ids for CVE-2021-4427
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: security@wordfence.com (Primary)
References for CVE-2021-4427
-
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/
Multiple WordPress plugins fixed CSRF vulnerabilities (part 3). – NinTechNetExploit;Third Party Advisory
-
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2553337%40free-comments-for-wordpress-vuukle&new=2553337%40free-comments-for-wordpress-vuukle&sfp_email=&sfph_mail=
Changeset 2553337 for free-comments-for-wordpress-vuukle – WordPress Plugin RepositoryPatch
-
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/
Multiple WordPress plugins fixed CSRF vulnerabilities (part 5). – NinTechNetExploit;Third Party Advisory
-
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/
Multiple WordPress plugins fixed CSRF vulnerabilities (part 2). – NinTechNetExploit;Third Party Advisory
-
https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/
25 WordPress plugins vulnerable to CSRF attacks. – NinTechNetExploit;Third Party Advisory
-
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/
Multiple WordPress plugins fixed CSRF vulnerabilities (part 4). – NinTechNetExploit;Third Party Advisory
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/ff28f33f-85d1-4987-975b-ee3bbcb394f4?source=cve
Vuukle Comments, Reactions, Share Bar, Revenue <= 3.4.31 - Cross-Site Request Forgery BypassExploit;Patch;Third Party Advisory
-
https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/
More WordPress plugins and themes vulnerable to CSRF attacks. – NinTechNetExploit;Third Party Advisory
-
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/
Multiple WordPress plugins fixed CSRF vulnerabilities (part 1). – NinTechNetExploit;Third Party Advisory
Jump to