Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (XSS) attacks via the (2) csj_width, (3) csj_height, (4) csj_sleep, (5) csj_fade, or (6) upload_image parameter in the thisismyurl_csj.php page to wp-admin/options-general.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Crossslide Jquery Project | Crossslide Jquery | 2.0.5 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/130313/WordPress-Cross-Slide-2.0.5-Cross-SiExploit
- http://www.securityfocus.com/bid/74894
- http://packetstormsecurity.com/files/130313/WordPress-Cross-Slide-2.0.5-Cross-SiExploit
- http://www.securityfocus.com/bid/74894
FAQ
What is CVE-2015-2089?
CVE-2015-2089 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authenticat...
How severe is CVE-2015-2089?
CVE-2015-2089 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2089?
Check the references section above for vendor advisories and patch information. Affected products include: Crossslide Jquery Project Crossslide Jquery.