Vulnerability Description
The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on the 'imgmap_save_area_title' function. This makes it possible for unauthenticated attackers to update the post title and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Imagemapper Project | Imagemapper | <= 1.2.6 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/imagemapper/tags/1.2.6/imagemapper.phPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb67f02-87e8-4ca3-8a9Third Party Advisory
- https://plugins.trac.wordpress.org/browser/imagemapper/tags/1.2.6/imagemapper.phPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb67f02-87e8-4ca3-8a9Third Party Advisory
FAQ
What is CVE-2023-5532?
CVE-2023-5532 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on the 'imgmap_save_area_...
How severe is CVE-2023-5532?
CVE-2023-5532 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5532?
Check the references section above for vendor advisories and patch information. Affected products include: Imagemapper Project Imagemapper.