First published: Wed Jul 12 2023(Updated: )
The Absolute Reviews plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.8. This is due to missing or incorrect nonce validation on the metabox_review_save() function. This makes it possible for unauthenticated attackers to save meta tags via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ashstonestudios Absolute Reviews | <=1.0.8 | |
Codesupply Absolute Reviews WordPress | <=1.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4426 is classified as a medium severity vulnerability due to its potential for Cross-Site Request Forgery attacks.
To address CVE-2021-4426, it is recommended to update the Absolute Reviews plugin to version 1.0.9 or later.
CVE-2021-4426 affects users of the Absolute Reviews plugin for WordPress, specifically versions up to and including 1.0.8.
CVE-2021-4426 is a Cross-Site Request Forgery (CSRF) vulnerability that allows unauthenticated attackers to manipulate meta tags.
While specific exploits for CVE-2021-4426 have not been widely reported, its CSRF nature indicates a risk of exploitation without proper nonce validation.