CVE-2024-11812: Wtyczka SeoPilot dla WP <= 3.3.091 - Cross-Site Request Forgery to Stored Cross-Site Scripting

6.1 CVSS

Description

The Wtyczka SeoPilot dla WP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.091. This is due to missing or incorrect nonce validation on the SeoPilot_Admin_Options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Classification

CVE ID: CVE-2024-11812

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.1

Affected Products

Vendor: seopilot

Product: Wtyczka SeoPilot dla WP

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 19.3% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/5efb2fbe-d839-4fb1-80bb-91adf0d39a2b?source=cve
https://plugins.trac.wordpress.org/browser/wtyczka-seopilot-dla-wp/trunk/seopilot.php#L88

Timeline