The Ecwid Ecommerce Shopping Cart WordPress plugin before 6.12.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ | Exploit Third Party Advisory |
Configurations
History
23 Jan 2024, 14:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | () https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/ - Exploit, Third Party Advisory | |
| CWE | CWE-352 | |
| First Time |
Lightspeedhq
Lightspeedhq ecwid Ecommerce Shopping Cart |
16 Jan 2024, 23:12
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-16 16:15
Updated : 2024-01-23 14:47
NVD link : CVE-2023-6292
Mitre link : CVE-2023-6292
CVE.ORG link : CVE-2023-6292
JSON object : View
Products Affected
lightspeedhq
- ecwid_ecommerce_shopping_cart
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
