Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation

Missing Authorization
CVE CVE-2023-32959
CVSS Medium (5.3)
Publicly Published May 16, 2023
Last Updated November 7, 2024
Researcher Dave Jong
Description

Several themes for WordPress are vulnerable to Cross-Site Request Forgery due to missing nonce validation on the activate_plugin() function called via an AJAX action in various versions of the themes. This makes it possible for unauthenticated attackers to activate arbitrary plugins via a forged request, if they can trick an authenticated user into performing an action such as clicking on a link.

References

11 affected software package

Software Type Theme
Software Slug kathmag (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.0.6
Patched Version
Software Type Theme
Software Slug online-estore (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.0.9
Patched Version
Software Type Theme
Software Slug spidermag (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.1.7
Patched Version
Software Type Theme
Software Slug medical-heed (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.1.4
Patched Version
Software Type Theme
Software Slug appzend (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.2.5
Patched Version
Software Type Theme
Software Slug buzzstore (view on wordpress.org)
Patched? No
Affected Version
  • <= *
Patched Version
Software Type Theme
Software Slug craft-blog (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.0.7
Patched Version
Software Type Theme
Software Slug fitness-park (view on wordpress.org)
Patched? No
Affected Version
  • <= *
Patched Version
Software Type Theme
Software Slug kingcabs (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.1.5
Patched Version
Software Type Theme
Software Slug metrostore (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.5.1
Patched Version
Software Type Theme
Software Slug sparklestore (view on wordpress.org)
Patched? No
Affected Version
  • <= 1.6.5
Patched Version
This record contains material that is subject to copyright

Copyright 2012-2026 Defiant Inc.
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. License Detail.