Description
Cross-site request forgery (CSRF) vulnerability in the FeedBurner FeedSmith 2.2 plugin for WordPress allows remote attackers to change settings and hijack blog feeds via a request to wp-admin/options-general.php that submits parameter values to FeedBurner_FeedSmith_Plugin.php, as demonstrated by the (1) feedburner_url and (2) feedburner_comments_url parameters.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by David Kierznowski · javascriptwebappsphp
https://www.exploit-db.com/exploits/30637
References (8)
Core 8
Core References
Exploit mailing-list
x_refsource_fulldisc
http://marc.info/?l=full-disclosure&m=119145344606493&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36940
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/27055
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/30637/
Exploit x_refsource_misc
http://blogsecurity.net/wordpress/feedburner-feed-hijacking/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/25921
Various Sources x_refsource_misc
http://blogsecurity.net/wordpress/feedsmith-feedburner-vulnerability-fixed/
Various Sources x_refsource_confirm
http://blogs.feedburner.com/feedburner/archives/2007/10/the_feedsmith_plugin_newly_for.php
Scores
EPSS
0.0327
EPSS Percentile
87.2%
Details
CWE
CWE-352
Status
published
Products (1)
feedburner/feedsmith
2.2
Published
Oct 05, 2007
Tracked Since
Feb 18, 2026