A Cross-Site-Request-Forgery (CSRF) vulnerability in widget_logic.php in the 2by2host Widget Logic plugin before 5.10.2 for WordPress allows remote attackers to execute PHP code via snippets (that are attached to widgets and then eval'd to dynamically determine their visibility) by crafting a malicious POST request that tricks administrators into adding the code.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://dannewitz.ninja/posts/widget-logic-csrf-to-rce | third party advisory exploit |
https://plugins.trac.wordpress.org/changeset/2112753/widget-logic | third party advisory |
https://wpvulndb.com/vulnerabilities/9413 | |
https://wpvulndb.com/vulnerabilities/9403 |