The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability 15320

WordPress WP to Twitter: sending Tweets

Synthesis of the vulnerability

An attacker can use WordPress WP to Twitter, in order to send spoofed Tweets.
Vulnerable systems: WordPress Plugins ~ not comprehensive.
Severity of this threat: 2/4.
Consequences of an attack: data creation/edition.
Pirate's origin: internet client.
Creation date: 10/09/2014.
Références of this weakness: VIGILANCE-VUL-15320.

Description of the vulnerability

The WP to Twitter plugin can be installed on WordPress.

However, access permissions are not always checked.

An attacker can therefore use WordPress WP to Twitter, in order to send spoofed Tweets.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerability database. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.