2 Oct 2019

Vulnerability Details: Cross-Site Request Forgery (CSRF)/Settings Change in Breeze

One of the changelog entries for the latest version of Breeze is “Fix: Validation of nonce.” That sounds a bit odd since a nonce is used to prevent cross-site request forgery (CSRF) and to do that to you check that a nonce sent with a request is valid. One of the recent Subversion commits for the plugin looked related as the log message was “Improved security for ‘nonce’ check“. Looking at that explained things, as previously the code only actually checked if a nonce was sent with the request, but not if it was valid, which defeats the purpose of it.

...


This post provides insights on a vulnerability in the WordPress plugin Breeze not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.

If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.

For existing customers, please log in to your account to view the rest of the contents of the post.

Leave a Reply

Your email address will not be published.