Description
WordPress Plugin multi Scheduler is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin multi Scheduler version 1.0.0 is vulnerable.
Remediation
Edit the source code to ensure that CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
Related Vulnerabilities
IBM RTC Improper Input Validation Vulnerability (CVE-2015-1928)
Nginx Uncontrolled Resource Consumption Vulnerability (CVE-2018-16843)
Apache 2.x version older than 2.0.48
WordPress Plugin WassUp Real Time Analytics Cross-Site Scripting (1.8.3)
OpenVPN AS Improper Authentication Vulnerability (CVE-2020-15077)