The Content Mask WordPress plugin before 1.8.4.1 does not have authorisation and CSRF checks in various AJAX actions, as well as does not validate the option to be updated to ensure it belongs to the plugin. As a result, any authenticated user, such as subscriber could modify arbitrary blog options
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820 | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820 - Exploit, Third Party Advisory | 
07 Nov 2023, 03:41
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-862  | 
    
04 Jul 2023, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
27 Jun 2023, 16:13
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-352 | 
Information
                Published : 2022-05-30 09:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1203
Mitre link : CVE-2022-1203
CVE.ORG link : CVE-2022-1203
JSON object : View
Products Affected
                content_mask_project
- content_mask
 
