CVE-2023-36517
High
|8.8Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to trick a user into performing actions on their WordPress site without their consent, potentially leading to unauthorized changes or data exposure. It requires the user to be logged into their account and to click on a malicious link while visiting a compromised website.
Technical Description
Cross-Site Request Forgery (CSRF) vulnerability in Kevon Adonis WP Abstracts plugin <= 2.6.2 versions.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 976 days
Quick Information
Published
Jul 11, 2023
over 2 years ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
kevonadonis
Product
wp abstracts