one-click-ssl Plugin up to 1.4.6 on WordPress cross site request forgery – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 31st, 2019 📆 | 3471 Views ⚑


one-click-ssl Plugin up to 1.4.6 on WordPress cross site request forgery

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability was found in one-click-ssl Plugin up to 1.4.6 on WordPress (WordPress Plugin). It has been declared as problematic. This vulnerability affects an unknown part. The manipulation with an unknown input leads to a cross site request forgery vulnerability. The CWE definition for the vulnerability is CWE-352. As an impact it is known to affect integrity. An attacker might be able force legitimate users to initiate unwanted actions within the web application.

The weakness was disclosed 08/30/2019. This vulnerability was named CVE-2019-15828 since 08/29/2019. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available.

Upgrading to version 1.4.7 eliminates this vulnerability.



VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.1

VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Cross site request forgery (CWE-352)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: one-click-ssl Plugin 1.4.7

08/29/2019 CVE assigned
08/30/2019 +1 days Advisory disclosed
08/31/2019 +1 days VulDB entry created
08/31/2019 +0 days VulDB last update
CVE: CVE-2019-15828 (🔒)Created: 08/31/2019 07:48 AM
Complete: 🔍


No comments yet. Please log in to comment.

Download it now for free!

Tagged with:

Leave a Reply