WordPress < 3.5 CSRF/XSRF Vulnerabilities

medium Nessus Network Monitor Plugin ID 9098

Synopsis

The remote server is hosting an outdated installation of WordPress that is vulnerable to Cross Site Request Forgery attacks.

Description

Versions of WordPress prior to 3.5 are susceptible to a flaw that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for sensitive transactions. By using a crafted URL (e.g., a crafted GET request inside an "img" tag), an attacker may trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into changing the URL of the feed for the incoming links section in the context of their session with the application, without further prompting or verification.

Solution

Upgrade to WordPress 3.5, or later.

See Also

http://codex.wordpress.org/Version_3.5

Plugin Details

Severity: Medium

ID: 9098

Family: CGI

Published: 2/26/2016

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Patch Publication Date: 9/11/2013

Vulnerability Publication Date: 9/11/2013

Reference Information

CVE: CVE-2012-4448

BID: 55795