Vulnerability Description
The WPML plugin before 3.1.9 for WordPress does not properly handle multiple actions in a request, which allows remote attackers to bypass nonce checks and perform arbitrary actions via a request containing an action POST parameter, an action GET parameter, and a valid nonce for the action GET parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpml | Wpml | <= 3.1.8 |
Related Weaknesses (CWE)
References
- http://klikki.fi/adv/wpml.htmlExploit
- http://packetstormsecurity.com/files/130839/WordPress-WPML-Missing-AuthenticatioExploit
- http://seclists.org/fulldisclosure/2015/Mar/79Exploit
- http://wpml.org/2015/03/wpml-security-update-bug-and-fix/Vendor Advisory
- http://klikki.fi/adv/wpml.htmlExploit
- http://packetstormsecurity.com/files/130839/WordPress-WPML-Missing-AuthenticatioExploit
- http://seclists.org/fulldisclosure/2015/Mar/79Exploit
- http://wpml.org/2015/03/wpml-security-update-bug-and-fix/Vendor Advisory
FAQ
What is CVE-2015-2792?
CVE-2015-2792 is a vulnerability with a CVSS score of 7.5 (HIGH). The WPML plugin before 3.1.9 for WordPress does not properly handle multiple actions in a request, which allows remote attackers to bypass nonce checks and perform arbitrary actions via a request cont...
How severe is CVE-2015-2792?
CVE-2015-2792 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2792?
Check the references section above for vendor advisories and patch information. Affected products include: Wpml Wpml.