CSRF Vulnerability in Email Keep Plugin for WordPress by Unknown Vendor
CVE-2024-13826

Currently unrated

Key Information:

Vendor
WordPress
Vendor
CVE Published:
8 March 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The Email Keep plugin for WordPress, up to version 1.1, lacks critical CSRF protection when updating its settings. This loophole allows attackers to execute unauthorized changes via a crafted request, targeting logged-in administrators. Consequently, this vulnerability poses a risk of altering plugin configurations without the admin's consent, potentially leading to further exploitation or compromise of the WordPress site.

Affected Version(s)

Email Keep 0 <= 1.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
WPScan
.