First published: Mon Mar 30 2015(Updated: )
The WPML plugin before 3.1.9 for WordPress does not properly handle multiple actions in a request, which allows remote attackers to bypass nonce checks and perform arbitrary actions via a request containing an action POST parameter, an action GET parameter, and a valid nonce for the action GET parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WPML | <=3.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2792 has a medium severity level as it allows remote attackers to bypass nonce checks.
To fix CVE-2015-2792, update the WPML plugin to version 3.1.9 or later.
WPML plugin versions before 3.1.9, including version 3.1.8 and earlier, are affected by CVE-2015-2792.
CVE-2015-2792 enables remote attackers to perform arbitrary actions on a WordPress site by bypassing nonce checks.
Yes, CVE-2015-2792 can potentially expose user data to unauthorized access and manipulation.