Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33605 | The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for unauthenticated attackers to update the plugins settings, via a forged request granted the attacker can trick a site's administrator into performing an action such as clicking on a link. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Buy Me a Coffee – Button and Widget Plugin <= 3.7 - Cross-Site Request Forgery | |
| Weaknesses | CWE-352 | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 08 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:57:12.740Z
Reserved: 2023-04-14T19:06:52.803Z
Link: CVE-2023-2079
Updated: 2024-08-02T06:12:20.168Z
Status : Modified
Published: 2023-07-11T03:15:09.310
Modified: 2026-04-08T18:17:56.850
Link: CVE-2023-2079
No data.
OpenCVE Enrichment
No data.
EUVD