First published: Thu May 09 2024(Updated: )
The Joli FAQ SEO – WordPress FAQ Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.2. This is due to missing or incorrect nonce validation when saving settings. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress FAQs plugin | <=1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4082 has a high severity rating due to the potential for unauthenticated attackers to exploit the Cross-Site Request Forgery vulnerability.
To fix CVE-2024-4082, update the Joli FAQ SEO – WordPress FAQ Plugin to the latest version beyond 1.3.2.
All users of the Joli FAQ SEO – WordPress FAQ Plugin up to and including version 1.3.2 are affected by CVE-2024-4082.
CVE-2024-4082 is classified as a Cross-Site Request Forgery vulnerability.
An attacker can exploit CVE-2024-4082 to manipulate the settings of the Joli FAQ SEO – WordPress FAQ Plugin without authentication.