CSRF Vulnerability in Email Keep Plugin for WordPress by Unknown Vendor
CVE-2024-13826
Currently unrated
Key Information:
- Vendor
- WordPress
- Status
- Vendor
- CVE Published:
- 8 March 2025
Badges
👾 Exploit Exists🟡 Public PoC
Summary
The Email Keep plugin for WordPress, up to version 1.1, lacks critical CSRF protection when updating its settings. This loophole allows attackers to execute unauthorized changes via a crafted request, targeting logged-in administrators. Consequently, this vulnerability poses a risk of altering plugin configurations without the admin's consent, potentially leading to further exploitation or compromise of the WordPress site.
Affected Version(s)
Email Keep 0 <= 1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Bob Matyas
WPScan