The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address
History

Wed, 21 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2022-09-26T12:35:44.000Z

Updated: 2025-05-21T19:16:49.270Z

Reserved: 2022-09-04T00:00:00.000Z

Link: CVE-2022-3119

cve-icon Vulnrichment

Updated: 2024-08-03T01:00:10.532Z

cve-icon NVD

Status : Modified

Published: 2022-09-26T13:15:11.217

Modified: 2025-05-21T20:15:28.627

Link: CVE-2022-3119

cve-icon Redhat

No data.