First published: Wed Apr 10 2024(Updated: )
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net.This issue affects WOLF – WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.1; BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net: from n/a through 1.1.4.1.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WOLF – WordPress Posts Bulk Editor and Manager Professional | <=1.0.8.1 | |
Bubble - Bulk Editor and Products Manager Professional for WooCommerce | <=1.1.4.1 | |
realmag777 BEAR – Bulk Editor and Products Manager Professional for WooCommerce | <1.1.4.2 | |
realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional | <1.0.8.2 |
Update WOLF plugin to 1.0.8.2 or a higher version. Update BEAR plugin to 1.1.4.2 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31430 is rated as a medium severity Cross-Site Request Forgery (CSRF) vulnerability.
To fix CVE-2024-31430, update the WOLF – WordPress Posts Bulk Editor and Manager Professional to version 1.0.8.2 or later, and BEAR – Bulk Editor and Products Manager Professional for WooCommerce to version 1.1.4.2 or later.
CVE-2024-31430 affects WOLF – WordPress Posts Bulk Editor and Manager Professional versions up to 1.0.8.1 and BEAR – Bulk Editor and Products Manager Professional for WooCommerce versions up to 1.1.4.1.
Yes, CVE-2024-31430 can allow attackers to perform unauthorized actions on behalf of authenticated users.
If you cannot update your plugins, consider disabling them temporarily until a safe update is possible to mitigate the risks associated with CVE-2024-31430.