First published: Wed Sep 25 2024(Updated: )
The Easy PayPal Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the wpeevent_plugin_buttons() function. This makes it possible for unauthenticated attackers to delete arbitrary posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Easy PayPal Events for WordPress | <1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8476 is classified as a medium severity vulnerability due to its potential for Cross-Site Request Forgery.
To fix CVE-2024-8476, update the Easy PayPal Events plugin to version 1.2.2 or later, ensuring proper nonce validation.
All users of the Easy PayPal Events plugin for WordPress versions up to and including 1.2.1 are impacted by CVE-2024-8476.
CVE-2024-8476 is a Cross-Site Request Forgery vulnerability due to missing proper nonce validation.
Yes, unauthenticated attackers can exploit CVE-2024-8476 to perform unauthorized actions on behalf of users.