Loading HuntDB...

CVE-2023-31093

UNKNOWN
Published 2023-11-09T22:49:25.672Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-31093. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <= 2.6.2 versions.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

WordPress Vulnerability

Identified and analyzed by Wordfence

Software Type

Plugin

Patch Status

Unpatched

Published

April 24, 2023

Software Details

Software Name

Chronosly Events Calendar

Software Slug

chronosly-events-calendar

Affected Versions

* - 2.6.2

Remediation

No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

© Defiant Inc. Data provided by Wordfence.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-9vf9-2prf-pcq9

Advisory Details

Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <= 2.6.2 versions.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: November 10, 2023, Modified: November 15, 2023

References

Published: 2023-11-09T22:49:25.672Z
Last Modified: 2024-09-03T17:52:31.124Z
Copied to clipboard!