Cross-Site Request Forgery in Zoorum WordPress Plugin Allows Unauthorized Settings Modification
The Zoorum Comments plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9. This is due to missing or incorrect nonce validation on the zoorum_set_options() function. This makes it possible for unauthenticated malicious users to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
zoorum zoorum comments |