The Custom User CSS WordPress plugin through 0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/4098b18d-6ff3-462c-af05-48adb6599cf3/ | third party advisory exploit technical description vdb entry |
https://magos-securitas.com/txt/CVE-2023-6391.txt | exploit |