Facebook Like Box Plugin For WordPress Multiple Cross-Site Request Forgery Vulnerabilities
20 May. 2015
Multiple cross-site request forgery (CSRF) vulnerabilities in the Facebook Like Box (cardoza-facebook-like-box) plugin before 2.8.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or conduct cross-site scripting (XSS) attacks via the (2) frm_title, (3) frm_url, (4) frm_border_color, (5) frm_width, or (6) frm_height parameter in the slug_for_fb_like_box page to wp-admin/admin.php.
* Facebook Like Box (cardoza-facebook-like-box) plugin before 2.8.3
* Facebook Like Box (cardoza-facebook-like-box) plugin after 2.8.3
Facebook Like Box plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to change the plugins admin settings. An attacker could exploit this vulnerability using the frm_title and other fields to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.