Vigil@nce - WordPress wpDiscuz: Cross Site Request Forgery via html-options.php
August 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Request Forgery via
html-options.php of WordPress wpDiscuz, in order to force the
victim to perform operations.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 21/06/2016.
DESCRIPTION OF THE VULNERABILITY
The wpDiscuz plugin can be installed on WordPress.
However, the origin of queries is not checked. They can for
example originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery via
html-options.php of WordPress wpDiscuz, in order to force the
victim to perform operations.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN