The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.4. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.4. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title YourChannel <= 1.2.4 - Cross-Site Request Forgery to Plugin Settings Change
Weaknesses CWE-352
References

Mon, 13 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-04-05T13:23:35.413Z

Updated: 2026-04-08T16:51:10.607Z

Reserved: 2023-04-05T13:23:25.433Z

Link: CVE-2023-1867

cve-icon Vulnrichment

Updated: 2024-08-02T06:05:26.690Z

cve-icon NVD

Status : Modified

Published: 2023-04-05T14:15:07.203

Modified: 2026-04-08T18:17:55.273

Link: CVE-2023-1867

cve-icon Redhat

No data.