
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2022-35277 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the GetResponse WordPress plugin versions 5.5.20 and below. The vulnerability was discovered and disclosed on September 1, 2022, by security researcher Rasi Afeef. The affected software is the GetResponse integration plugin for WordPress, which lacked proper CSRF protection mechanisms when updating API keys (WPScan, NVD).
The vulnerability is classified as CWE-352 (Cross-Site Request Forgery) and received varying CVSS scores: an NVD base score of 8.8 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, and a Patchstack assessment of 5.4 (MEDIUM) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N. The vulnerability specifically affects the API key update functionality, which lacks proper CSRF protection mechanisms (NVD).
If exploited, this vulnerability could allow attackers to make logged-in administrators unknowingly update the API key through a CSRF attack. This could potentially lead to unauthorized access to API functionality and compromise of the integration between WordPress and GetResponse services (WPScan).
The vulnerability was fixed in version 5.5.21 of the GetResponse WordPress plugin. Users are advised to update to this version or later to mitigate the risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."