mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-10 20:04:58 +02:00
19 lines
1.0 KiB
Markdown
19 lines
1.0 KiB
Markdown
### [CVE-2021-24704](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24704)
|
|

|
|

|
|
&color=brighgreen)
|
|

|
|
|
|
### Description
|
|
|
|
In the Orange Form WordPress plugin through 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow attackers to make a logged in admin delete arbitrary posts for example
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://wpscan.com/vulnerability/60843022-fe43-4608-8859-9c9109b35b42
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|