First published: Tue Sep 17 2024(Updated: )
The PropertyHive plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.19. This is due to missing or incorrect nonce validation on the 'save_account_details' function. This makes it possible for unauthenticated attackers to edit the name, email address, and password of an administrator account via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
PropertyHive PropertyHive | <2.0.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8490 is considered a medium severity vulnerability due to the potential for unauthenticated attackers to exploit it.
To fix CVE-2024-8490, update the PropertyHive plugin to version 2.0.20 or later.
CVE-2024-8490 is a Cross-Site Request Forgery (CSRF) vulnerability.
All users of the PropertyHive plugin for WordPress running versions up to and including 2.0.19 are affected by CVE-2024-8490.
The vulnerable function in CVE-2024-8490 is 'save_account_details', which lacks proper nonce validation.