ID |
CVE-2025-2871
|
Sažetak |
The WordPress Mega Menu – QuadMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the ajax_dismiss_notice() function. This makes it possible for unauthenticated attackers to update any user meta to a value of one, including wp_capabilities which could result in a privilege deescalation of an administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
Reference |
|
CVSS |
Base: | 4.3 |
Impact: | 1.4 |
Exploitability: | 2.8 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
LOW |
NONE |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
Zadnje važnije ažuriranje |
15-04-2025 - 18:39 |
Objavljeno |
12-04-2025 - 04:15 |