6.8
CVSSv2

CVE-2014-5346

Published: 19/08/2014 Updated: 20/08/2014
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple cross-site request forgery (CSRF) vulnerabilities in the Disqus Comment System plugin 2.77 for WordPress allow remote malicious users to hijack the authentication of administrators for requests that (1) activate or (2) deactivate the plugin via the active parameter to wp-admin/edit-comments.php, (3) import comments via an import_comments action, or (4) export comments via an export_comments action to wp-admin/index.php.

Vulnerable Product Search on Vulmon Subscribe to Product

disqus disqus comment system 2.77

Exploits

<!-- Exploit for Disqus for Wordpress admin stored CSRF+XSS up to v275 Blog post explainer: wwwnikcubcom/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin/ 12th August 2014 Nik Cubrilovic - wwwnikcubcom Most of these params are unfiltered/injectable Not framable on newer Wordpress --> <body onload="javascript: ...