CVE-2024-1501

Published Feb 21, 2024

Last updated a month ago

Overview

Description
The Database Reset plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.22. This is due to missing or incorrect nonce validation on the install_wpr() function. This makes it possible for unauthenticated attackers to install the WP Reset Plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Source
security@wordfence.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Secondary
Base score
4.7
Impact score
1.4
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Severity
MEDIUM

Weaknesses

nvd@nist.gov
CWE-352

Social media

Hype score
Not currently trending

Configurations