First published: Fri Oct 20 2023(Updated: )
The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.7. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save code snippets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpfactory Custom Css\, Js \& Php | <=2.0.7 |
https://plugins.trac.wordpress.org/browser/custom-css-js-php/trunk/modules/code/model.code.php#L85
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-4418.
The affected software is the Custom CSS, JS & PHP plugin for WordPress up to and including version 2.0.7.
The severity of CVE-2021-4418 is medium (4.3).
CVE-2021-4418 is a Cross-Site Request Forgery (CSRF) vulnerability in the Custom CSS, JS & PHP plugin for WordPress versions up to and including 2.0.7. It allows unauthenticated attackers to save code snippets via a forged request.
To fix CVE-2021-4418, you should update the Custom CSS, JS & PHP plugin for WordPress to the latest version available.