24 Jul 2019

Vulnerability Details: Cross-Site Request Forgery (CSRF)/Settings Change in Custom Simple Rss

One of the changelog entries for the latest version of Custom Simple Rss is “fix – fixed some security issues”. Looking over the changes made in that version we found that protection against cross-site request forgery (CSRF) was added when changing the plugin’s settings, which prevents an attacker from causing an Administrator to change the settings without intending it. There was enough sanitization done when changing the settings that it looks like there wasn’t anything more serious, say cross-site scripting (XSS), that could be exploited through that.

...


This post provides insights on a vulnerability in the WordPress plugin Custom Simple Rss not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.

If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.

For existing customers, please log in to your account to view the rest of the contents of the post.

Leave a Reply

Your email address will not be published.