Multiple cross-site request forgery (CSRF) vulnerabilities in the HMS Testimonials plugin prior to 2.0.11 for WordPress allow remote malicious users to hijack the authentication of administrators for requests that (1) add new testimonials via the hms-testimonials-addnew page, (2) add new groups via the hms-testimonials-addnewgroup page, (3) change default settings via the hms-testimonials-settings page, (4) change advanced settings via the hms-testimonials-settings-advanced page, (5) change custom fields settings via the hms-testimonials-settings-fields page, or (6) change template settings via the hms-testimonials-templates-new page to wp-admin/admin.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
hitmyserver hms testimonials 2.0.7 |
||
hitmyserver hms testimonials 2.0.6 |
||
hitmyserver hms testimonials 2.0.5 |
||
hitmyserver hms testimonials 2.0.4 |
||
hitmyserver hms testimonials 1.3 |
||
hitmyserver hms testimonials 1.2 |
||
hitmyserver hms testimonials 1.1 |
||
hitmyserver hms testimonials 2.0.9 |
||
hitmyserver hms testimonials 2.0.2 |
||
hitmyserver hms testimonials 2.0 |
||
hitmyserver hms testimonials 1.6 |
||
hitmyserver hms testimonials 1.4.1 |
||
hitmyserver hms testimonials 1.7.1 |
||
hitmyserver hms testimonials 1.7 |
||
hitmyserver hms testimonials 1.6.2 |
||
hitmyserver hms testimonials 1.6.1 |
||
hitmyserver hms testimonials |
||
hitmyserver hms testimonials 2.0.8 |
||
hitmyserver hms testimonials 2.0.3 |
||
hitmyserver hms testimonials 2.0.1 |
||
hitmyserver hms testimonials 1.5 |
||
hitmyserver hms testimonials 1.4 |