
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross-Site Request Forgery (CSRF) vulnerability affects SAKURA Internet Inc. TS Webfonts for さくらのレンタルサーバ WordPress plugin versions 3.1.2 and earlier. The vulnerability was discovered in April 2023 and publicly disclosed on May 30, 2023. The issue was fixed in version 3.1.3 (Patchstack).
The vulnerability is classified as a Broken Access Control issue with a CVSS v3.1 base score of 8.8 HIGH (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The security flaw stems from missing authorization, authentication, or nonce token checks in certain functions, which could allow unprivileged users to execute higher privileged actions (Patchstack).
If exploited, this CSRF vulnerability could allow attackers to perform unauthorized actions with elevated privileges on behalf of authenticated users. The vulnerability has been rated with High impact scores for Confidentiality, Integrity, and Availability (NVD).
Users are strongly advised to update to version 3.1.3 or later of the TS Webfonts for さくらのレンタルサーバ plugin to address this vulnerability. The software has been noted as potentially abandoned, as it had not received updates for over a year, so users should consider replacing it with alternative solutions (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."