Description
WordPress Plugin Process Steps Template Designer is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin Process Steps Template Designer version 1.2.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.3.1 or latest
References
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/
https://plugins.svn.wordpress.org/process-steps-template-designer/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin WooCommerce PayU India (PayUmoney-PayUbiz) Parameter Tampering (2.1.1)
WordPress Plugin WordPress Framework Possible Backdoor (1.0)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2080)
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-8447)
WordPress Plugin Google Doc Embedder Cross-Site Scripting (2.5.18)