First published: Fri Oct 20 2023(Updated: )
The Website Builder by SeedProd plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.15.13.1. This is due to missing or incorrect nonce validation on functionality in the builder.php file. This makes it possible for unauthenticated attackers to change the stripe connect token via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
SeedProd Website Builder | <=6.15.13.1 |
https://plugins.trac.wordpress.org/changeset/2968455/coming-soon/trunk/resources/views/builder.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4975 is a vulnerability in the Website Builder by SeedProd plugin for WordPress that allows unauthenticated attackers to perform Cross-Site Request Forgery attacks.
The severity of CVE-2023-4975 is medium with a CVSS score of 4.3.
CVE-2023-4975 affects versions up to and including 6.15.13.1 of the Website Builder by SeedProd plugin for WordPress.
Unauthenticated attackers can exploit CVE-2023-4975 by performing Cross-Site Request Forgery attacks.
To fix CVE-2023-4975, it is recommended to update the Website Builder by SeedProd plugin to a version that includes the necessary nonce validation.