Cross-site request forgery (CSRF) vulnerability in the JW Player plugin before 2.1.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that remove players via a delete action to wp-admin/admin.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://security.dxw.com/advisories/jw-player-for-flash-html5-video/ | exploit |
http://wordpress.org/plugins/jw-player-plugin-for-wordpress/changelog | patch |
http://secunia.com/advisories/59173 | third party advisory |
http://seclists.org/fulldisclosure/2014/Jun/64 | mailing list exploit |