First published: Fri May 10 2024(Updated: )
The reCAPTCHA Jetpack WordPress plugin through 0.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress reCAPTCHA Jetpack | <=0.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3940 is considered a medium severity vulnerability due to its potential impact on admin settings through CSRF attacks.
To fix CVE-2024-3940, update the reCAPTCHA Jetpack WordPress plugin to a version above 0.2.2.
Users of the reCAPTCHA Jetpack WordPress plugin version 0.2.2 and below are affected by CVE-2024-3940.
CVE-2024-3940 is associated with Cross-Site Request Forgery (CSRF) attacks.
Yes, CVE-2024-3940 may be exploited remotely if the attacker can trick a logged-in admin into executing a CSRF attack.