Multiple cross-site request forgery (CSRF) vulnerabilities in twitget.php in the Twitget plugin before 3.3.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that change unspecified plugin options via a request to wp-admin/options-general.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://wordpress.org/plugins/twitget/changelog | vendor advisory |
http://secunia.com/advisories/57892 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92391 | vdb entry |
http://packetstormsecurity.com/files/126134 | exploit |
http://seclists.org/fulldisclosure/2014/Apr/172 | exploit mailing list |
https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1 | exploit |