CVE-2020-36760Cross-Site Request Forgery in Ocean Extra

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 65.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 12

Description

The Ocean Extra plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5]. This is due to missing or incorrect nonce validation on the add_core_extensions_bundle_validation() function. This makes it possible for unauthenticated attackers to validate extension bundles via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

CVEListV5oceanwp/ocean_extra< 1.6.6

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mmhq-gjww-gfj5: The Ocean Extra plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 12023-07-12
CVEList
Ocean Extra <=1.6.5 - Cross-Site Request Forgery Bypass2023-07-12
CVE-2020-36760 — Cross-Site Request Forgery | cvebase