WordPress WP Spell Check Plugin <= 9.17 is vulnerable to Cross Site Request Forgery (CSRF)
CVE-2024-22143

8.8HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
31 January 2024

Summary

A Cross-Site Request Forgery (CSRF) vulnerability exists in the WP Spell Check plugin, affecting users of the plugin from versions n/a through 9.17. This vulnerability can allow attackers to execute unauthorized actions on behalf of logged-in users if the user is tricked into clicking a malicious link. Such exploitation may lead to unintended changes or data exposure, making it essential for website administrators to apply available security updates and implement appropriate safeguards.

Affected Version(s)

WP Spell Check <= 9.17

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mika (Patchstack Alliance)
.