First published: Thu Mar 07 2024(Updated: )
The Digits plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.4.1. This is due to missing nonce validation in the 'digits_save_settings' function. This makes it possible for unauthenticated attackers to modify the default role of registered users to elevate user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=8.4.1 | ||
Wordpress | <=8.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0203 has a medium severity rating due to its potential impact on user roles in a WordPress site.
To fix CVE-2024-0203, update the Digits plugin to version 8.4.2 or later, which includes nonce validation improvements.
CVE-2024-0203 affects users of the Digits plugin for WordPress, specifically versions up to and including 8.4.1.
CVE-2024-0203 allows unauthenticated attackers to execute Cross-Site Request Forgery attacks, potentially altering user roles.
CVE-2024-0203 was disclosed in 2024, highlighting a significant security vulnerability in the Digits plugin.