The Yuki theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including 1.3.14. This is due to missing or incorrect nonce validation on the reset_customizer_options() function. This makes it possible for unauthenticated attackers to reset the themes settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
08 Jan 2025, 18:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wpmoose
Wpmoose yuki |
|
References | () https://themes.trac.wordpress.org/changeset/218603/yuki/1.3.15/inc/extensions/class-reset-extension.php - Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb760fb-f281-4649-9bd3-92f8e281f07e?source=cve - Patch | |
CPE | cpe:2.3:a:wpmoose:yuki:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-352 |
Information
Published : 2024-02-28 07:15
Updated : 2025-01-08 18:47
NVD link : CVE-2024-1943
Mitre link : CVE-2024-1943
CVE.ORG link : CVE-2024-1943
JSON object : View
Products Affected
wpmoose
- yuki
CWE
CWE-352
Cross-Site Request Forgery (CSRF)