cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-4413,https://securityvulnerability.io/vulnerability/CVE-2021-4413,Cross-Site Request Forgery in Process Steps Template Designer for WordPress,"The Process Steps Template Designer plugin for WordPress is susceptible to Cross-Site Request Forgery (CSRF) due to inadequate nonce validation within the save() function. This vulnerability can allow unauthenticated attackers to exploit the system by persuading a site administrator to execute certain actions, such as clicking on a malicious link. If successful, the attacker can manipulate saved field icons without proper authentication, potentially leading to user data compromise and site integrity issues.",Wordpress,Process Steps Template Designer,4.3,MEDIUM,0.008559999987483025,false,,false,false,false,,false,false,2023-07-12T03:40:43.955Z,0 CVE-2021-4349,https://securityvulnerability.io/vulnerability/CVE-2021-4349,Cross-Site Request Forgery in Process Steps Template Designer for WordPress,"The Process Steps Template Designer plugin for WordPress is susceptible to Cross-Site Request Forgery, allowing unauthenticated attackers to execute unauthorized actions by tricking site administrators into clicking on malicious links. This vulnerability affects versions up to and including 1.2.1. Users are encouraged to update to the latest version to safeguard against these exploits.",Wordpress,Process Steps Template Designer,8.8,HIGH,0.004399999976158142,false,,false,false,false,,false,false,2023-06-07T01:51:15.459Z,0