{"containers":{"cna":{"affected":[{"product":"Shortcut Macros","vendor":"Unknown","versions":[{"lessThanOrEqual":"1.3","status":"affected","version":"1.3","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Daniel Ruf"}],"descriptions":[{"lang":"en","value":"The Shortcut Macros WordPress plugin through 1.3 does not have authorisation and CSRF checks in place when updating its settings, which could allow any authenticated users, such as subscriber, to update them."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-07-11T12:56:58.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a"}],"source":{"discovery":"EXTERNAL"},"title":"Shortcut Macros <= 1.3 - Subscriber+ Arbitrary Settings Update","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-1956","STATE":"PUBLIC","TITLE":"Shortcut Macros <= 1.3 - Subscriber+ Arbitrary Settings Update"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Shortcut Macros","version":{"version_data":[{"version_affected":"<=","version_name":"1.3","version_value":"1.3"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Daniel Ruf"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Shortcut Macros WordPress plugin through 1.3 does not have authorisation and CSRF checks in place when updating its settings, which could allow any authenticated users, such as subscriber, to update them."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a","refsource":"MISC","url":"https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:24:43.993Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1956","datePublished":"2022-07-11T12:56:58.000Z","dateReserved":"2022-05-31T00:00:00.000Z","dateUpdated":"2024-08-03T00:24:43.993Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}