WordPress ProjectTheme Multiple Vulnerabilities
During an internal code review multiple vulnerabilities were identified. The whole application misses input validation and output encoding. This means user supplied input is inserted in a unsafe way. This could allow a remote attacker to easily compromise user accounts. For example, an authenticated user sends a private message to another user. When the attacker injects JavaScript Code, it will automatically call the CSRF Proc below. The only necessary information is the user id, which can be identified easily. If the other user opens the private message menu, the JavaScript code gets executed and the Password will be changed. It is not necessary to open the message. Now the attacker can access the account using the new password.