Cross-site request forgery (CSRF) vulnerability in the JW Player plugin before 2.1.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that remove players via a delete action to wp-admin/admin.php.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | * | 2.1.3 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.0.0 (including) | 2.0.0 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.0.1 (including) | 2.0.1 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.0.2 (including) | 2.0.2 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.0.3 (including) | 2.0.3 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.0.4 (including) | 2.0.4 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.0.5 (including) | 2.0.5 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.1.0 (including) | 2.1.0 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.1.1 (including) | 2.1.1 (including) |
Jw_player_for_flash_&_html5_video_plugin | Longtailvideo | 2.1.2 (including) | 2.1.2 (including) |