Vulnerability Description
The One Click Plugin Updater WordPress plugin through 2.4.14 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and disable / hide the badge of the available updates and the related check.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| One Click Plugin Updater Project | One Click Plugin Updater | <= 2.4.14 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431ExploitThird Party Advisory
- https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431ExploitThird Party Advisory
FAQ
What is CVE-2022-1791?
CVE-2022-1791 is a vulnerability with a CVSS score of 8.1 (HIGH). The One Click Plugin Updater WordPress plugin through 2.4.14 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF ...
How severe is CVE-2022-1791?
CVE-2022-1791 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1791?
Check the references section above for vendor advisories and patch information. Affected products include: One Click Plugin Updater Project One Click Plugin Updater.