First published: Thu Jan 11 2024(Updated: )
The GiveWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.33.3. This is due to missing or incorrect nonce validation on the give_sendwp_remote_install_handler function. This makes it possible for unauthenticated attackers to install and activate the SendWP plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Givenu Givenu Give | <=2.33.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4246 is considered a medium-severity vulnerability due to its potential impact on unauthorized plugin installation and activation.
To fix CVE-2023-4246, update the GiveWP plugin to version 2.34 or later, which includes proper nonce validation.
CVE-2023-4246 affects users of the GiveWP plugin for WordPress running any version up to and including 2.33.3.
CVE-2023-4246 is classified as a Cross-Site Request Forgery (CSRF) vulnerability due to missing nonce validation.
Yes, CVE-2023-4246 can be exploited by unauthenticated attackers, allowing them to install and activate plugins.