The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://twitter.com/UnD3sc0n0c1d0 | third party advisory |
https://wordpress.org/plugins/multi-scheduler/#developers | third party advisory product |
https://infayer.com/archivos/448 | third party advisory exploit |
https://www.exploit-db.com/exploits/48532 | exploit vdb entry third party advisory |
https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html | exploit vdb entry third party advisory |
https://cxsecurity.com/issue/WLB-2020050235 | third party advisory exploit |
https://0day.today/exploit/34496 | broken link |
https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user | third party advisory exploit |