{ "schema_version": "1.4.0", "id": "GHSA-gq77-h4w4-h7hf", "modified": "2022-05-17T01:15:37Z", "published": "2022-05-17T01:15:37Z", "aliases": [ "CVE-2014-5347" ], "details": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Disqus Comment System plugin before 2.76 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) disqus_replace, (2) disqus_public_key, or (3) disqus_secret_key parameter to wp-admin/edit-comments.php in manage.php or that (4) reset or (5) delete plugin options via the reset parameter to wp-admin/edit-comments.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5347" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95288" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95289" }, { "type": "WEB", "url": "https://gist.github.com/nikcub/cb5dc7a5464276c8424a" }, { "type": "WEB", "url": "https://wordpress.org/plugins/disqus-comment-system/other_notes" }, { "type": "WEB", "url": "https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Aug/35" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/34336" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/69205" } ], "database_specific": { "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-08-19T19:55:00Z" } }