WordPress WP Spell Check Plugin <= 9.17 is vulnerable to Cross Site Request Forgery (CSRF)
CVE-2024-22143
8.8HIGH
Summary
A Cross-Site Request Forgery (CSRF) vulnerability exists in the WP Spell Check plugin, affecting users of the plugin from versions n/a through 9.17. This vulnerability can allow attackers to execute unauthorized actions on behalf of logged-in users if the user is tricked into clicking a malicious link. Such exploitation may lead to unintended changes or data exposure, making it essential for website administrators to apply available security updates and implement appropriate safeguards.
Affected Version(s)
WP Spell Check <= 9.17
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mika (Patchstack Alliance)