- Published on
-
Sep 11, 2013
- Research Description
-
Multiple cross-site request forgery (CSRF) vulnerabilities in the IndiaNIC Testimonial plugin 2.2 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add a testimonial via an iNIC_testimonial_save action; (2) add a listing template via an iNIC_testimonial_save_listing_template action; (3) add a widget template via an iNIC_testimonial_save_widget action; insert cross-site scripting (XSS) sequences via the (4) project_name, (5) project_url, (6) client_name, (7) client_city, (8) client_state, (9) description, (10) tags, (11) video_url, or (12) is_featured, (13) title, (14) widget_title, (15) no_of_testimonials, (16) filter_by_country, (17) filter_by_tags, or (18) widget_template parameter to wp-admin/admin-ajax.php.
- Affected versions
-
Min -, max 2.3.
Plugin Security Certification
Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.
Get Plugin Security Certificate
New vulnerability |
Redis Object Cache
, Sep 17, 2025
|
Zakra
(CVE-2025-8595)
, Sep 15, 2025
|
PDF Embedder
, Sep 11, 2025
|
Pixeline's Email Protector
(CVE-2025-58982)
, Sep 11, 2025
|
Include Me
(CVE-2025-58983)
, Sep 11, 2025
|