First published: Thu Jan 16 2025(Updated: )
The WP User Profile Avatar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the wpupa_user_admin() function. This makes it possible for unauthenticated attackers to update the plugins setting which controls access to the functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10789 is considered medium due to potential unauthorized actions that can be performed by attackers.
To fix CVE-2024-10789, update the WP User Profile Avatar plugin to version 1.0.6 or later.
CVE-2024-10789 affects all versions of the WP User Profile Avatar plugin up to and including 1.0.5.
CVE-2024-10789 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, unauthenticated users can exploit CVE-2024-10789 due to missing nonce validation.