Cross-Site Request Forgery Vulnerability in Wtyczka SeoPilot for WordPress
CVE-2024-11812

6.1MEDIUM

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
20 December 2024

What is CVE-2024-11812?

The SeoPilot dla WP plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) attacks across all versions up to and including 3.3.091. The vulnerability arises from the lack of proper nonce validation in the SeoPilot_Admin_Options() function. As a result, an attacker can exploit this weakness to issue unauthorized requests that can lead to the modification of settings or the injection of malicious scripts, particularly if they can trick a site administrator into initiating an action. This presents a significant risk for sites using the affected plugin, highlighting the importance of keeping plugin versions updated and implementing secure coding practices to safeguard against CSRF attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Wtyczka SeoPilot dla WP * <= 3.3.091

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

SOPROBRO
.