Description
WordPress Plugin Process Steps Template Designer is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin Process Steps Template Designer version 1.2.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.3.1 or latest
References
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/
https://plugins.svn.wordpress.org/process-steps-template-designer/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin Surveys SQL Injection (1.01.8)
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17306)
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-6514)
WordPress Plugin Learning Courses Privilege Escalation (4.7)
Python Integer Overflow or Wraparound Vulnerability (CVE-2018-20406)