The Stetic WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the stats_page function found in the ~/stetic.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.0.6.
Solution:
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://plugins.trac.wordpress.org/browser/stetic/trunk/stetic.php#L129 | third party advisory |
https://wordfence.com/vulnerability-advisories/#CVE-2021-42364 | third party advisory |