First published: Fri Oct 27 2023(Updated: )
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the addedit functionality. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5820 is a vulnerability found in the Thumbnail Slider With Lightbox plugin for WordPress, allowing unauthenticated attackers to upload arbitrary files using a forged request.
CVE-2023-5820 has a severity rating of 9.6 out of 10, classified as critical.
CVE-2023-5820 affects users of the Thumbnail Slider With Lightbox plugin for WordPress, potentially allowing attackers to upload arbitrary files.
Yes, users should update to a fixed version of the Thumbnail Slider With Lightbox plugin for WordPress.
You can find more information about CVE-2023-5820 at the following references: [link1](https://www.wordfence.com/threat-intel/vulnerabilities/id/e51e1cd2-6de9-4820-8bba-1c6b5053e2c1?source=cve) [link2](https://wordpress.org/plugins/wp-responsive-slider-with-lightbox) [link3](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1263536%40wp-responsive-slider-with-lightbox&new=1263536%40wp-responsive-slider-with-lightbox&sfp_email=&sfph_mail=).