First published: Mon Jul 18 2022(Updated: )
The WordPress plugin Image Slider is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.1.121 due to failure to properly check for the existence of a nonce in the function ewic_duplicate_slider. This make it possible for unauthenticated attackers to duplicate existing posts or pages granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
GhozyLab Image Slider Widget | <=1.1.121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2223 is classified as a medium severity vulnerability due to its potential for exploitation by unauthenticated attackers.
To fix CVE-2022-2223, update the Image Slider plugin to version 1.1.122 or later, where the vulnerability has been addressed.
CVE-2022-2223 affects all WordPress sites using the Image Slider plugin version 1.1.121 and earlier.
CVE-2022-2223 is a Cross-Site Request Forgery (CSRF) vulnerability that allows unauthorized actions against the WordPress site.
Yes, CVE-2022-2223 can be exploited remotely by attackers to duplicate posts without requiring authentication.