First published: Sun Dec 18 2022(Updated: )
A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Admin | <1.5.2 |
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4604 is classified as a problematic vulnerability due to its potential for cross-site request forgery.
To fix CVE-2022-4604, upgrade the wp-english-wp-admin plugin to version 1.5.2 or higher.
CVE-2022-4604 allows for remote cross-site request forgery attacks.
The function register_endpoints in the file english-wp-admin.php is affected by CVE-2022-4604.
Versions of the wp-english-wp-admin plugin up to and including 1.5.1 are vulnerable to CVE-2022-4604.