less than 1 minute read

Leyka Plugin

Researcher

This vulnerability was discovered by @yuyudhn.

Details

Detail about Leyka WordPress Plugin.

Parameter Value
Software Leyka
Description Leyka is a plugin for crowdfunding and donations collection via WordPress website.
Type WordPress Plugin
Developer Teplitsa
Plugin URL https://wordpress.org/plugins/ultimate-landing-page
Vulnerable Version < 3.30
Classification Cross-Site Scripting, Broken Access Control
Required privilege Unauthenticated
Publicly disclosed 03.03.2023

CVE-2023-27442

The Leyka plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.29.2. This makes it possible for unauthenticated attackers to perform an unknown action granted they can trick a site administrator into performing an action such as clicking on a link. The impact of this vulnerability is unknown.

Status: Patched at Leyka 3.30.

The developer add nonce to prevent CSRF at Leyka Plugin. Patch CSRF

CVE-2023-27450

The Leyka plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 3.29.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Status: Patched at Leyka 3.30.

The developer add esc_attr to prevent XSS at Leyka Plugin. Patch XSS

References

  • Github Commit #1
  • Github Commit #2
  • https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/leyka/leyka-3292-cross-site-request-forgery
  • https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/leyka/leyka-3292-unauthenticated-stored-cross-site-scripting

Tags: ,

Categories:

Updated: