Description
The Word Balloon WordPress plugin before 4.20.3 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to trick a logged in user to delete arbitrary avatars by clicking a link.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58157 | The Word Balloon WordPress plugin before 4.20.3 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to trick a logged in user to delete arbitrary avatars by clicking a link. |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T08:14:24.267Z
Reserved: 2023-10-31T14:50:26.479Z
Link: CVE-2023-5884
No data.
Status : Modified
Published: 2023-12-04T22:15:08.020
Modified: 2024-11-21T08:42:42.393
Link: CVE-2023-5884
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD