First published: Fri Jul 12 2024(Updated: )
The ContentLock WordPress plugin through 1.0.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6022 is considered a medium severity vulnerability due to the potential for attackers to exploit it via CSRF attacks on admin settings.
To fix CVE-2024-6022, update the ContentLock WordPress plugin to version 1.0.4 or later, which includes the necessary CSRF checks.
CVE-2024-6022 affects users of the ContentLock WordPress plugin versions prior to 1.0.4.
CVE-2024-6022 allows CSRF attacks, enabling logged in attackers to change plugin settings without proper authentication.
The best workaround for CVE-2024-6022 is to restrict access to the WordPress admin area and update the plugin until a patch is applied.