The Yuki theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including 1.3.14. This is due to missing or incorrect nonce validation on the reset_customizer_options() function. This makes it possible for unauthenticated attackers to reset the themes settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
| Link | Resource |
|---|---|
| https://themes.trac.wordpress.org/changeset/218603/yuki/1.3.15/inc/extensions/class-reset-extension.php | Patch Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb760fb-f281-4649-9bd3-92f8e281f07e?source=cve | Patch Third Party Advisory |
| https://themes.trac.wordpress.org/changeset/218603/yuki/1.3.15/inc/extensions/class-reset-extension.php | Patch Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb760fb-f281-4649-9bd3-92f8e281f07e?source=cve | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-28 07:15
Updated : 2025-01-08 18:47
NVD link : CVE-2024-1943
Mitre link : CVE-2024-1943
CVE.ORG link : CVE-2024-1943
JSON object : View
Products Affected
wpmoose
- yuki
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
