CVE-2022-1599

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1599
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1599.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-1599
Published
2022-07-11T13:15:08Z
Modified
2025-01-08T08:37:38.683093Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The Admin Management Xtended WordPress plugin before 2.4.5 does not have CSRF checks in some of its AJAX actions, allowing attackers to make a logged users with the right capabilities to call them. This can lead to changes in post status (draft, published), slug, post date, comment status (enabled, disabled) and more.

References

Affected packages

Git / github.com/oliverschloebe/admin-management-xtended

Affected ranges

Type
GIT
Repo
https://github.com/oliverschloebe/admin-management-xtended
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.4.1.1
2.4.2