
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross-site request forgery (CSRF) vulnerability was discovered in Browser and Operating System Finder WordPress plugin versions prior to 1.2. The vulnerability allows a remote unauthenticated attacker to hijack the authentication of an administrator via unspecified vectors (JVN Report, WPScan).
The plugin lacks proper authorization and CSRF checks when saving its settings, allowing unauthenticated users to update them. This could also lead to Stored XSS due to the lack of sanitization and escaping. While version 1.2 added a CSRF check, it was still missing capability checks. The vulnerability has been assigned a CVSS score of 8.3 (high) (WPScan).
If exploited, an attacker could perform unintended operations when an administrator views a malicious page while logged in. Additionally, the vulnerability could allow unauthenticated users to update plugin settings, which could also lead to Stored XSS attacks (JVN Report, WPScan).
Users are advised to update the plugin to version 1.2 or later according to the information provided by the developer. As of May 18, 2022, the plugin has been closed and is no longer available for download due to security issues (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."