Description
Cross-site request forgery (CSRF) vulnerability in the JW Player plugin before 2.1.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that remove players via a delete action to wp-admin/admin.php.
Exploits (1)
References (4)
Core 4
Core References
Exploit x_refsource_misc
https://security.dxw.com/advisories/jw-player-for-flash-html5-video/
Patch x_refsource_confirm
http://wordpress.org/plugins/jw-player-plugin-for-wordpress/changelog
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/59173
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/Jun/64
Scores
EPSS
0.0034
EPSS Percentile
57.0%
Details
CWE
CWE-352
Status
published
Products (10)
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.0.0
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.0.1
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.0.2
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.0.3
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.0.4
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.0.5
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.1.0
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.1.1
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
2.1.2
longtailvideo/jw_player_for_flash_\&_html5_video_plugin
< 2.1.3
Published
Jun 25, 2014
Tracked Since
Feb 18, 2026