Multiple cross-site request forgery (CSRF) vulnerabilities in the Disqus Comment System plugin before 2.76 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) disqus_replace, (2) disqus_public_key, or (3) disqus_secret_key parameter to wp-admin/edit-comments.php in manage.php or that (4) reset or (5) delete plugin options via the reset parameter to wp-admin/edit-comments.php.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://wordpress.org/plugins/disqus-comment-system/other_notes | x_refsource_CONFIRM |
| http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html | x_refsource_MISC |
| http://seclists.org/fulldisclosure/2014/Aug/35 | mailing-list x_refsource_FULLDISC |
| http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html | x_refsource_MISC |
| https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin | x_refsource_MISC |
| https://gist.github.com/nikcub/cb5dc7a5464276c8424a | x_refsource_MISC |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/95288 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/bid/69205 | vdb-entry x_refsource_BID |
| http://www.exploit-db.com/exploits/34336 | exploit x_refsource_EXPLOIT-DB |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/95289 | vdb-entry x_refsource_XF |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|