The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing nonce validation on the 'update_action' function. This makes it possible for unauthenticated attackers to approve or reject user account registrations via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
Attack Parameters
Attack Vector
Network
Атака возможна удалённо
Attack Complexity
Low
Легко эксплуатировать
Privileges Required
None
Права не нужны
User Interaction
Required
Нужно действие пользователя
Impact Assessment
Confidentiality
None
Нет утечки данных
Integrity
Low
Частичная модификация данных
Availability
None
Нет нарушения работы
CVSS Vector v3.1
Weakness Type (CWE)
References 4
https://plugins.trac.wordpress.org/browser/wp-front-end-profile/tags/1.3.8/func…
security@wordfence.com
https://plugins.trac.wordpress.org/browser/wp-front-end-profile/trunk/functions…
security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&ol…
security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/74b186fd-5825-4a20-82…
security@wordfence.com