First published: Thu Feb 19 2015(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the Image Metadata Cruncher plugin for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) image_metadata_cruncher[alt] or (2) image_metadata_cruncher[caption] parameter in an update action in the image_metadata_cruncher_title page to wp-admin/options.php or (3) custom image meta tag to the image metadata cruncher page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Image Metadata Cruncher |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1614 is classified as a moderate severity vulnerability due to its potential for cross-site request forgery (CSRF) attacks.
To fix CVE-2015-1614, update the Image Metadata Cruncher plugin to the latest version provided by the developers.
CVE-2015-1614 allows remote attackers to perform cross-site scripting (XSS) attacks by hijacking administrator authentication.
CVE-2015-1614 affects users of the Image Metadata Cruncher plugin for WordPress, particularly administrators.
While specific exploit attempts may vary, CVE-2015-1614 has been documented as a significant security concern in WordPress environments.