The yith-maintenance-mode plugin before 1.2.0 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=yith-maintenance-mode panel_page parameter.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://wpvulndb.com/vulnerabilities/8285 | third party advisory exploit |
https://wordpress.org/plugins/yith-maintenance-mode/#developers | product third party advisory |
http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html | third party advisory exploit |