First published: Sat Jul 01 2023(Updated: )
The Locations plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.1. This is due to missing or incorrect nonce validation on the saveCustomFields() function. This makes it possible for unauthenticated attackers to update custom field meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goldplugins Locations | <4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Locations plugin in WordPress is CVE-2021-4394.
The severity of the CVE-2021-4394 vulnerability is high, with a severity value of 8.8.
Versions up to and including 3.2.1 of the Locations plugin are affected by the CVE-2021-4394 vulnerability.
Cross-Site Request Forgery (CSRF) is a type of attack where an attacker tricks a victim into performing an unwanted action without their knowledge or consent.
You can find more information about the CVE-2021-4394 vulnerability at the following references: [link1], [link2], [link3].