CVE-2023-7048

My Sticky Bar <= 2.6.6 - Cross-Site Request Forgery to Sensitive Information Exposure

lowCross-Site Request Forgery (CSRF)
3.1
CVSS Score
3.1
CVSS Score
low
Severity
2.6.7
Patched in
209d
Time to patch

Description

The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Low
Confidentiality
None
Integrity
None
Availability

Technical Details

Affected versions<=2.6.6
PublishedJanuary 3, 2024
Last updatedJuly 29, 2024
Affected pluginmystickymenu

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.