First published: Sat Feb 15 2025(Updated: )
The DirectoryPress Frontend plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.9. This is due to missing or incorrect nonce validation on the dpfl_listingStatusChange() function. This makes it possible for unauthenticated attackers to update listing statuses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
DirectoryPress Frontend | <=2.7.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10581 is classified as a medium severity vulnerability due to its potential for unauthorized actions.
To fix CVE-2024-10581, update the DirectoryPress Frontend plugin for WordPress to version 2.8.0 or later.
All users of the DirectoryPress Frontend plugin for WordPress up to and including version 2.7.9 are affected by CVE-2024-10581.
CVE-2024-10581 is a Cross-Site Request Forgery (CSRF) vulnerability that allows unauthorized changes to be made.
Yes, CVE-2024-10581 can be exploited by unauthenticated attackers to perform actions without user consent.