CVE-2023-6292

The Ecwid Ecommerce Shopping Cart WordPress plugin before 6.12.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*

History

23 Jan 2024, 14:47

Type Values Removed Values Added
CPE cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
References () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - Exploit, Third Party Advisory
CWE CWE-352
First Time Lightspeedhq
Lightspeedhq ecwid Ecommerce Shopping Cart

16 Jan 2024, 23:12

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 16:15

Updated : 2024-01-23 14:47


NVD link : CVE-2023-6292

Mitre link : CVE-2023-6292

CVE.ORG link : CVE-2023-6292


JSON object : View

Products Affected

lightspeedhq

  • ecwid_ecommerce_shopping_cart
CWE
CWE-352

Cross-Site Request Forgery (CSRF)