Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the twitterDash plugin 2.1 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the username_twitterDash parameter in the twitterDash.php page to wp-admin/options-general.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Twitterdash Project | Twitterdash | <= 2.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.hExploit
- http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.hExploit
FAQ
What is CVE-2014-9368?
CVE-2014-9368 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Cross-site request forgery (CSRF) vulnerability in the twitterDash plugin 2.1 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct...
How severe is CVE-2014-9368?
CVE-2014-9368 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9368?
Check the references section above for vendor advisories and patch information. Affected products include: Twitterdash Project Twitterdash.