Beta

Report

CoSchedule <= 3.3.8 is vulnerable to Cross Site Request Forgery (CSRF)

Unauthenticated
Published
2023-04-12

The CoSchedule plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.8. This is due to missing nonce validation on the tm_aj_set_token function. This makes it possible for unauthenticated attackers to set the plugin's schedule token via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS

Score:4.3

Severity:Medium

Version: 3.3.8

There is a patch available in v3.3.9 and we strongly recommend you update to this version as soon as possible.