The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function.
References
Configurations
History
17 Jan 2024, 22:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/changeset/3016780/mystickymenu - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/be0ab40f-cff7-48bd-8dae-cc50af047151?source=cve - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| CPE | cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:* | |
| First Time |
Premio my Sticky Bar
Premio |
|
| CWE | CWE-352 |
11 Jan 2024, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-11 09:15
Updated : 2024-01-17 22:32
NVD link : CVE-2023-7048
Mitre link : CVE-2023-7048
CVE.ORG link : CVE-2023-7048
JSON object : View
Products Affected
premio
- my_sticky_bar
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
