First published: Mon Aug 02 2021(Updated: )
The Admin Custom Login WordPress plugin is vulnerable to Cross-Site Request Forgery due to the loginbgSave action found in the ~/includes/Login-form-setting/Login-form-background.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.2.7.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Weblizar Admin Custom Login | <=3.2.7 |
Update plugin to version 3.2.8 or newer.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34628.
The title of the vulnerability is 'The Admin Custom Login WordPress plugin is vulnerable to Cross-Site Request Forgery due to the login…'
The severity of CVE-2021-34628 is high with a CVSS score of 8.8.
The affected software is the Weblizar Admin Custom Login plugin for WordPress versions up to and including 3.2.7.
An attacker can exploit this vulnerability by injecting arbitrary web scripts through the loginbgSave action found in the ~/includes/Login-form-setting/Login-form-background.php file.