Unauthenticated attackers can delete engagements via forged requests
CVE-2024-9649
4.3MEDIUM
Key Information
- Vendor
- Alimir
- Status
- WP Ulike – All-in-one Engagement Toolkit
- Vendor
- CVE Published:
- 16 October 2024
Summary
The WP ULike – The Ultimate Engagement Toolkit for Websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7.4. This is due to missing or incorrect nonce validation on the wp_ulike_delete_history_api() function. This makes it possible for unauthenticated attackers to delete engagements via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Version(s)
WP ULike – All-in-One Engagement Toolkit <= 4.7.4
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Bilal Chawich