The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin prior to 1.7.0, allowing malicious users to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|