First published: Wed Feb 21 2024(Updated: )
The Database Reset plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.22. This is due to missing or incorrect nonce validation on the install_wpr() function. This makes it possible for unauthenticated attackers to install the WP Reset Plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Database Reset | <3.23 | |
WP Database Reset | <=3.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1501 is classified as a medium severity vulnerability due to Cross-Site Request Forgery risks.
To fix CVE-2024-1501, update the Database Reset plugin to version 3.23 or later, which includes proper nonce validation.
All users of the Database Reset plugin for WordPress up to version 3.22 are affected by CVE-2024-1501.
CVE-2024-1501 allows unauthenticated attackers to perform a Cross-Site Request Forgery attack, potentially installing the WP Reset Plugin.
To avoid CVE-2024-1501, ensure you are using version 3.23 or later of the Database Reset plugin.