The NPS computy WordPress plugin through 2.7.5 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ | Exploit Third Party Advisory |
Configurations
History
08 May 2025, 19:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:computy:nps_computy:*:*:*:*:*:wordpress:*:* | |
First Time |
Computy
Computy nps Computy |
|
References | () https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/ - Exploit, Third Party Advisory |
Information
Published : 2024-04-15 05:15
Updated : 2025-05-08 19:50
NVD link : CVE-2024-1755
Mitre link : CVE-2024-1755
CVE.ORG link : CVE-2024-1755
JSON object : View
Products Affected
computy
- nps_computy
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')