CSRF Vulnerability in Email Keep Plugin for WordPress by Unknown Vendor
CVE-2024-13826 
5.4MEDIUM
Key Information:
- Vendor
 WordPress
- Status
 - Vendor
 - CVE Published:
 - 8 March 2025
 
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2024-13826?
The Email Keep plugin for WordPress, up to version 1.1, lacks critical CSRF protection when updating its settings. This loophole allows attackers to execute unauthorized changes via a crafted request, targeting logged-in administrators. Consequently, this vulnerability poses a risk of altering plugin configurations without the admin's consent, potentially leading to further exploitation or compromise of the WordPress site.
Affected Version(s)
Email Keep 0 <= 1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
 Low
Availability:
 Low
Attack Vector:
Network
Attack Complexity:
 Low
Privileges Required:
 Low
User Interaction:
 Required
Scope:
 Changed
Timeline
- 🟡
Public PoC available
 - 👾
Exploit known to exist
 Vulnerability published
Vulnerability Reserved
Credit
Bob Matyas
WPScan