Medium severity4.3NVD Advisory· Published Jul 12, 2023· Updated Apr 8, 2026
CVE-2021-4427
CVE-2021-4427
Description
The Vuukle Comments, Reactions, Share Bar, Revenue plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.31. This is due to missing or incorrect nonce validation in the /admin/partials/free-comments-for-wordpress-vuukle-admin-display.php file. This makes it possible for unauthenticated attackers to edit the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected products
1- cpe:2.3:a:vuukle:vuukle_comments\,_reactions\,_share_bar\,_revenue:*:*:*:*:*:wordpress:*:*Range: <=3.4.31
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- plugins.trac.wordpress.org/changesetnvdPatch
- blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/nvdExploitThird Party Advisory
- blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/nvdExploitThird Party Advisory
- blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/nvdExploitThird Party Advisory
- blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/nvdExploitThird Party Advisory
- blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/nvdExploitThird Party Advisory
- blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/nvdExploitThird Party Advisory
- blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/nvdExploitThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/ff28f33f-85d1-4987-975b-ee3bbcb394f4nvdExploitPatchThird Party Advisory
News mentions
0No linked articles in our index yet.