WordPress FreshMail For WordPress Plugin <= 2.3.2 is vulnerable to Cross Site Request Forgery (CSRF)
CVE-2024-22304
8.8HIGH
Summary
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in FreshMail for WordPress, a plugin developed by Borbis Media. This vulnerability allows an attacker to execute unauthorized commands on behalf of an authenticated user without their consent. The issue affects all versions of FreshMail for WordPress up to 2.3.2, potentially exposing users to security breaches that could compromise their data and website integrity. Users are advised to take immediate action to secure their installations and update to the latest version to mitigate the risks associated with this vulnerability.
Affected Version(s)
FreshMail For WordPress <= 2.3.2
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Skalucy (Patchstack Alliance)