Products
WP GoToWebinar
- from n/a
- through 15.7
Source
audit@patchstack.com
Tags
CVE-2024-38776 details
Published : Aug. 2, 2024, 8:15 a.m.
Last Modified : Aug. 2, 2024, 12:59 p.m.
Last Modified : Aug. 2, 2024, 12:59 p.m.
Description
Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson WP GoToWebinar allows Cross-Site Scripting (XSS).This issue affects WP GoToWebinar: from n/a through 15.7.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.1 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-352 | Cross-Site Request Forgery (CSRF) | The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
Base Score
7.1
Exploitability Score
2.8
Impact Score
3.7
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
References
URL | Source |
---|---|
https://patchstack.com/database/vulnerability/wp-gotowebinar/wordpress-wp-gotowebinar-plugin-15-7-csrf-to-xss-vulnerability?_s_id=cve | audit@patchstack.com |
This website uses the NVD API, but is not approved or certified by it.