The SIP Calculator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 14 Dec 2024 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The SIP Calculator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | SIP Calculator <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-14T04:23:37.530Z
Updated: 2024-12-16T17:51:12.916Z
Reserved: 2024-12-11T22:03:08.791Z
Link: CVE-2024-12555
Updated: 2024-12-16T16:51:20.344Z
Status : Received
Published: 2024-12-14T05:15:11.827
Modified: 2024-12-14T05:15:11.827
Link: CVE-2024-12555
No data.
ReportizFlow