Report
The CoSchedule plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.8. This is due to missing nonce validation on the tm_aj_set_token function. This makes it possible for unauthenticated attackers to set the plugin's schedule token via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
Score:4.3
Severity:Medium
Version: 3.3.8
There is a patch available in v3.3.9 and we strongly recommend you update to this version as soon as possible.