Lucene search

K
cvelistPatchstackCVELIST:CVE-2024-32099
HistoryApr 15, 2024 - 8:54 a.m.

CVE-2024-32099 WordPress WP Mail Catcher plugin <= 2.1.6 - Cross Site Request Forgery vulnerability

2024-04-1508:54:08
CWE-352
Patchstack
www.cve.org
cve-2024-32099
wordpress
wp mail catcher
cross site request forgery

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Cross-Site Request Forgery (CSRF) vulnerability in James Ward WP Mail Catcher.This issue affects WP Mail Catcher: from n/a through 2.1.6.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "wp-mail-catcher",
    "product": "WP Mail Catcher",
    "vendor": "James Ward",
    "versions": [
      {
        "changes": [
          {
            "at": "2.1.7",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "2.1.6",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVELIST:CVE-2024-32099