Rewterz Threat Alert – LockBit Ransomware – Active IOCs
May 29, 2023Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
May 29, 2023Rewterz Threat Alert – LockBit Ransomware – Active IOCs
May 29, 2023Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
May 29, 2023Severity
Medium
Analysis Summary
CVE-2022-47177 CVSS:4.3
WP EasyPay Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-47174 CVSS:4.3
Performance Lab Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-47178 CVSS:4.3
Simple Share Buttons Adder Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
Impact
- Gain Access
Indicators Of Compromise
CVE
- CVE-2022-47177
- CVE-2022-47174
- CVE-2022-47178
Affected Vendors
WordPress
Affected Products
- Theme Tweaker Plugin for WordPress 5.20
- WP EasyPay Plugin for WordPress 4.1
- Performance Lab Plugin for WordPress 2.2.0
- Simple Share Buttons Adder Plugin for WordPress 8.4.7
Remediation
Refer to Patcstack Website for patch, upgrade or suggested workaround information.