
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-3926 is a Cross-Site Request Forgery (CSRF) vulnerability discovered in the WP OAuth Server WordPress plugin versions below 3.4.2. The vulnerability was publicly disclosed on November 10, 2022, and was discovered by security researcher Lana Codes (WPScan).
The vulnerability stems from the absence of CSRF protection mechanisms when regenerating client secrets in the WP OAuth Server plugin. It has been assigned a CVSS score of 4.3 (Medium) and is classified under CWE-352. The vulnerability falls under the OWASP Top 10 category A2: Broken Authentication and Session Management (WPScan).
When exploited, this vulnerability allows attackers to force logged-in administrators to regenerate the secret of any arbitrary client, provided they know the client ID. This could potentially disrupt OAuth authentication processes and affect application access controls (WPScan).
The vulnerability has been patched in version 3.4.2 of the WP OAuth Server plugin. Users are advised to update to this version or later to mitigate the risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."