Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58101 | The Amazonify plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.8.1. This is due to missing or incorrect nonce validation on the amazonifyOptionsPage() function. This makes it possible for unauthenticated attackers to update the plugins settings, including the Amazon Tracking ID, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Amazonify <= 0.8.1 - Cross-Site Request Forgery to Amazon Tracking ID Update |
Wed, 22 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:45:37.162Z
Reserved: 2023-10-26T22:40:15.553Z
Link: CVE-2023-5818
Updated: 2024-08-02T08:14:24.176Z
Status : Modified
Published: 2023-11-07T20:15:09.297
Modified: 2026-04-08T18:18:33.930
Link: CVE-2023-5818
No data.
OpenCVE Enrichment
No data.
EUVD