WPGlobus 翻译选项 <= 2.2.0 - 跨站请求伪造到存储的跨站脚本 (CVE-2024-9434)
CVE编号
CVE-2024-9434利用情况
暂无补丁情况
N/A披露时间
2024-10-31漏洞描述
The WPGlobus Translate Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the on__translate_options_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts and update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://plugins.trac.wordpress.org/browser/wpglobus-translate-options/trunk/i... | |
https://www.wordfence.com/threat-intel/vulnerabilities/id/ddca65fa-0744-4b2a-... |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论