Description
WordPress Plugin Process Steps Template Designer is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin Process Steps Template Designer version 1.2.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.3.1 or latest
References
https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/
https://plugins.svn.wordpress.org/process-steps-template-designer/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin Qwizcards-online quizzes and flashcards Cross-Site Scripting (3.61)
Drupal Core 4.7.x Security Bypass (4.7.0 - 4.7.7)
WordPress Plugin AddToAny Share Buttons Host Header Injection (1.7.14)
ReviveAdserver URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2021-22873)