Vulnerability Description
Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpkube | Subscribe To Comments Reloaded | <= 211130 |
Related Weaknesses (CWE)
References
- https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/worThird Party Advisory
- https://wordpress.org/plugins/subscribe-to-comments-reloaded/ProductThird Party Advisory
- https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/worThird Party Advisory
- https://wordpress.org/plugins/subscribe-to-comments-reloaded/ProductThird Party Advisory
FAQ
What is CVE-2022-29414?
CVE-2022-29414 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info...
How severe is CVE-2022-29414?
CVE-2022-29414 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29414?
Check the references section above for vendor advisories and patch information. Affected products include: Wpkube Subscribe To Comments Reloaded.