First published: Tue Mar 12 2024(Updated: )
The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.14. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to generate and delete labels via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bulgarisation WooCommerce plugin for WordPress | <3.0.15 | |
WooCommerce Bulgarisation | <=3.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2395 is classified as a medium severity vulnerability due to its potential for Cross-Site Request Forgery.
To fix CVE-2024-2395, update the Bulgarisation for WooCommerce plugin to version 3.0.15 or higher.
CVE-2024-2395 affects all versions of the Bulgarisation for WooCommerce plugin for WordPress up to and including version 3.0.14.
CVE-2024-2395 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, unauthenticated attackers can exploit CVE-2024-2395 to generate and delete labels due to missing nonce validation.