WP_Admin_UI in the Crony Cronjob Manager plugin before 0.4.7 for WordPress has CSRF via the name parameter in an action=manage&do=create operation, as demonstrated by inserting XSS sequences.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://wordpress.org/plugins/crony/#developers | third party advisory |
https://github.com/cybersecurityworks/Disclosed/issues/9 | exploit third party advisory technical description |
https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html | third party advisory exploit |