Cross-Site Request Forgery Vulnerability in Ecwid by Lightspeed Ecommerce Shopping Cart for WordPress
CVE-2024-13795
4.3MEDIUM
Key Information:
- Vendor
- Ecwid
- Status
- Ecwid By Lightspeed Ecommerce Shopping Cart
- Vendor
- CVE Published:
- 18 February 2025
Summary
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is affected by a Cross-Site Request Forgery vulnerability in versions up to and including 6.12.27. This security flaw arises from inadequate nonce validation within the ecwid_deactivate_feedback() function. As a result, unauthorized attackers can potentially exploit this issue to send deactivation messages masquerading as a site owner. This exploitation requires the attacker to deceive a site administrator into executing an action, such as clicking a specially crafted link, thereby facilitating an unauthorized request.
Affected Version(s)
Ecwid by Lightspeed Ecommerce Shopping Cart * <= 6.12.27
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Brian Sans-Souci