Lucene search

K
cveWordfenceCVE-2024-0431
HistoryFeb 28, 2024 - 9:15 a.m.

CVE-2024-0431

2024-02-2809:15:40
Wordfence
web.nvd.nist.gov
74
gestpay
woocommerce
wordpress
plugin
cve-2024-0431
cross-site request forgery
csrf
nvd
security vulnerability
nonce validation

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

9.0%

The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the ‘ajax_set_default_card’ function. This makes it possible for unauthenticated attackers to set the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Affected configurations

Vulners
Node
easynologestpay_for_woocommerceRange20221130wordpress
VendorProductVersionCPE
easynologestpay_for_woocommerce*cpe:2.3:a:easynolo:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "easynolo",
    "product": "Gestpay for WooCommerce",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "20221130",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

9.0%