The Similarity WordPress plugin through 3.0 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack
[
{
"vendor": "Unknown",
"product": "Similarity",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "3.0"
}
],
"defaultStatus": "affected"
}
]