patchstack.com
Open in
urlscan Pro
18.245.46.126
Public Scan
Submitted URL: https://click.email.sans.org/?qs=06cef0ef715902be2af80b23aef1dafc5c290fa76d69ebe1fcf70881dd8f501a98fb00b2c15e88b7f3b8fc188f1e...
Effective URL: https://patchstack.com/database/wordpress/plugin/flashnews-fading-effect-pearlbells/vulnerability/wordpress-flash-news-...
Submission: On December 24 via api from AE — Scanned from DE
Effective URL: https://patchstack.com/database/wordpress/plugin/flashnews-fading-effect-pearlbells/vulnerability/wordpress-flash-news-...
Submission: On December 24 via api from AE — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://patchstack.com/database/subscribe
<form action="https://patchstack.com/database/subscribe" method="POST" class="form-newsletter" id="form-newsletter">
<input type="hidden" name="_token" value="aP2e6cCxlJxYGgNhC8pYNnuUbdOHjG03nEzI7NvV">
<div class="form-container">
<div class="icon">
<img src="https://patchstack.com/database/img/envelope.svg" alt="vPatch available">
</div>
<label class="email-label">
<input type="email" name="email" placeholder="Enter e-mail" class="input-email">
</label>
<button class="btn btn-sm btn-primary">Subscribe</button>
</div>
</form>
Text Content
We value your privacy We use cookies to enhance your browsing experience, serve personalised ads or content, and analyse our traffic. By clicking "Accept All", you consent to our use of cookies. Customize Reject All Accept All Customise Consent Preferences We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below. The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... Show more NecessaryAlways Active Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data. * Cookie XSRF-TOKEN * Duration 2 hours * Description This cookie enhances visitor browsing security by preventing cross-site request forgery. * Cookie intercom-id-* * Duration 8 months 26 days 1 hour * Description Intercom sets this cookie that allows visitors to see any conversations they've had on Intercom websites. * Cookie intercom-session-* * Duration 7 days * Description Intercom sets this cookie that allows visitors to see any conversations they've had on Intercom websites. * Cookie intercom-device-id-* * Duration 8 months 26 days 1 hour * Description Intercom sets this cookie that allows visitors to see any conversations they've had on Intercom websites. * Cookie _GRECAPTCHA * Duration 6 months * Description Google Recaptcha service sets this cookie to identify bots to protect the website against malicious spam attacks. * Cookie rc::a * Duration Never Expires * Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks. * Cookie rc::f * Duration Never Expires * Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks. * Cookie rc::c * Duration session * Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks. * Cookie rc::b * Duration session * Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks. Functional Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features. * Cookie yt-remote-device-id * Duration Never Expires * Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos. * Cookie ytidb::LAST_RESULT_ENTRY_KEY * Duration Never Expires * Description The cookie ytidb::LAST_RESULT_ENTRY_KEY is used by YouTube to store the last search result entry that was clicked by the user. This information is used to improve the user experience by providing more relevant search results in the future. * Cookie yt-remote-connected-devices * Duration Never Expires * Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos. * Cookie yt-remote-session-app * Duration session * Description The yt-remote-session-app cookie is used by YouTube to store user preferences and information about the interface of the embedded YouTube video player. * Cookie yt-remote-cast-installed * Duration session * Description The yt-remote-cast-installed cookie is used to store the user's video player preferences using embedded YouTube video. * Cookie yt-remote-session-name * Duration session * Description The yt-remote-session-name cookie is used by YouTube to store the user's video player preferences using embedded YouTube video. * Cookie yt-remote-fast-check-period * Duration session * Description The yt-remote-fast-check-period cookie is used by YouTube to store the user's video player preferences for embedded YouTube videos. * Cookie sp_t * Duration 1 year * Description The sp_t cookie is set by Spotify to implement audio content from Spotify on the website and also registers information on user interaction related to the audio content. * Cookie sp_landing * Duration 1 day * Description The sp_landing is set by Spotify to implement audio content from Spotify on the website and also registers information on user interaction related to the audio content. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc. * Cookie _omappvp * Duration 1 year 1 month 4 days * Description The _omappvp cookie is set to distinguish new and returning users and is used in conjunction with _omappvs cookie. * Cookie _omappvs * Duration 20 minutes * Description The _omappvs cookie, used in conjunction with the _omappvp cookies, is used to determine if the visitor has visited the website before, or if it is a new visitor. * Cookie _gcl_au * Duration 3 months * Description Google Tag Manager sets the cookie to experiment advertisement efficiency of websites using their services. * Cookie _ga_* * Duration 1 year 1 month 4 days * Description Google Analytics sets this cookie to store and count page views. * Cookie _ga * Duration 1 year 1 month 4 days * Description Google Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors. * Cookie _hjSessionUser_* * Duration 1 year * Description Hotjar sets this cookie to ensure data from subsequent visits to the same site is attributed to the same user ID, which persists in the Hotjar User ID, which is unique to that site. * Cookie _hjSession_* * Duration 1 hour * Description Hotjar sets this cookie to ensure data from subsequent visits to the same site is attributed to the same user ID, which persists in the Hotjar User ID, which is unique to that site. * Cookie _fbp * Duration 3 months * Description Facebook sets this cookie to display advertisements when either on Facebook or on a digital platform powered by Facebook advertising after visiting the website. * Cookie _gh_sess * Duration session * Description GitHub sets this cookie for temporary application and framework state between pages like what step the user is on in a multiple step form. Performance Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors. * Cookie loglevel * Duration Never Expires * Description Squarespace sets this cookie to maintain settings and outputs when using the Developer Tools Console on the current session. Advertisement Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns. * Cookie YSC * Duration session * Description Youtube sets this cookie to track the views of embedded videos on Youtube pages. * Cookie VISITOR_INFO1_LIVE * Duration 6 months * Description YouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface. * Cookie VISITOR_PRIVACY_METADATA * Duration 6 months * Description YouTube sets this cookie to store the user's cookie consent state for the current domain. * Cookie yt.innertube::requests * Duration Never Expires * Description YouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen. * Cookie yt.innertube::nextId * Duration Never Expires * Description YouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen. Uncategorised Other uncategorised cookies are those that are being analysed and have not been classified into a category as yet. * Cookie psdb_session * Duration 2 hours * Description Description is currently not available. * Cookie patchstack_src * Duration 1 year 1 month 4 days * Description Description is currently not available. * Cookie __Secure-ROLLOUT_TOKEN * Duration 6 months * Description Description is currently not available. * Cookie _octo * Duration 1 year * Description No description available. * Cookie logged_in * Duration 1 year * Description No description available. Reject All Save My Preferences Accept All Powered by Pricing Solutions WordPress security Instantly fix and mitigate vulnerabilities Plugin auditing Paid auditing for WordPress vendors Managed VDP Start a security program for your plugin Bug Bounty Join the community and earn bounties Enterprise API At scale monitoring and vPatching for hosts Vulnerability database The latest WordPress security intelligence Login Start trial WORDPRESS FLASH NEWS / POST (RESPONSIVE) PLUGIN <= 4.1 IS VULNERABLE TO CROSS SITE REQUEST FORGERY (CSRF) Low priority vPatch unnecessary <= 4.1 Vulnerable version No official fix available Fixed version Plugin No VDP 14 December 2024 by Patchstack RISKS CVSS 9.8 9.8 CROSS SITE REQUEST FORGERY (CSRF) This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication. This is a general description of this vulnerability type, specific impact varies case by case. CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way, but it is not ideal for CMSs. SOLUTIONS This security issue has a low severity impact and is unlikely to be exploited. DETAILS Software Flash News / Post (Responsive) Type Plugin Vulnerable versions <= 4.1 Fixed in N/A OWASP Top 10 A1: Broken Access Control Classification Cross Site Request Forgery (CSRF) CVE CVE-2024-56012 Patch priority Low CVSS severity Low (9.8) Developer Claim ownership PSID 836401a23d39 Credits Mika Required privilege Unauthenticated Published 14 December, 2024 Expand full details Have additional information or questions about this entry? Let us know. FOUND THIS USEFUL? SUPPORT FOR REPORTING THIS VULNERABILITY. Send thanks FOUND THIS REPORT USEFUL? Send thanks TIMELINE Reported by Mika 14 Oct 2024 Early warning sent out to Patchstack customers 14 Dec 2024 Published by Patchstack 16 Dec 2024 Go to Plugin page No VDP How can Patchstack provide the fastest protection? Patchstack is one of the largest open-source vulnerability disclosers in the world. For example, in 2023 more than 70% of new WordPress vulnerabilities were originally published by Patchstack. This focus on research enables us to deploy vulnerability protection rules faster than anybody else. What is virtual patching? Patchstack vPatching auto-mitigates security vulnerabilities even when there's no official patch available. It's the fastest and most effective way to eliminate new security vulnerabilities without sacrificing performance. Why would a hacker target my website? Hackers automate attacks against new security vulnerabilities to take over as many websites as they can before users have time to patch and update. The attacks are opportunistic and victims are not chosen - everyone is a target. What if my website has already been compromised? We recommend reaching out to your hosting provider for server-side malware scanning or use a professional incident response service. Don't rely on plugin based malware scanners as they are commonly tampered with by malware. WEEKLY WORDPRESS SECURITY INTELLIGENCE DELIVERED TO YOUR INBOX. Subscribe WEBSITE SECURITY Pricing For WordPress For WooCommerce For agencies API For hosts Documentation FAQ Log in FOR PLUGIN DEVS Managed VDP Log inNEW Active programs Security auditing FOR RESEARCHERS Bug bounty Log inNEW Guidelines LearnNEW Discord RESOURCES Vulnerability Database Whitepaper 2024 WordPress StatisticsNEW Case studiesNEW Articles PATCHSTACK About Careers AffiliatesNEW Merch store Media kit SOCIALS LinkedIn Facebook X © 2024 Patchstack DPA Privacy Policy Terms & Conditions WEBSITE SECURITY Pricing For WordPress For WooCommerce For agencies API For hosts Documentation FAQ Log in FOR PLUGIN DEVS Managed VDP Log inNEW Active programs Security auditing FOR RESEARCHERS Bug bounty Log inNEW Guidelines LearnNEW Discord RESOURCES Vulnerability Database Whitepaper 2024 WordPress StatisticsNEW Case studiesNEW Articles PATCHSTACK About Careers AffiliatesNEW Merch store Media kit SOCIALS LinkedIn Facebook X LET US KNOW IF WE HAVE MISSED A VULNERABILITY REPORTED ELSEWHERE Report Close RECAPTCHA'S VERIFICATION FAILED! THANK YOU FOR CONTRIBUTING! Close