First published: Wed Oct 16 2024(Updated: )
The WP ULike – The Ultimate Engagement Toolkit for Websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7.4. This is due to missing or incorrect nonce validation on the wp_ulike_delete_history_api() function. This makes it possible for unauthenticated attackers to delete engagements via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP ULike | <=4.7.4 | |
TechnoWich WP ULike | <4.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9649 is categorized as a moderate severity vulnerability due to the potential for Cross-Site Request Forgery attacks.
To fix CVE-2024-9649, update the WP ULike plugin to version 4.7.5 or later, which includes the necessary nonce validation improvements.
All versions of the WP ULike plugin for WordPress up to and including 4.7.4 are affected by CVE-2024-9649.
An attacker exploiting CVE-2024-9649 can perform unauthorized actions on behalf of users, potentially compromising user data and site integrity.
While the best practice is to update to the latest version, temporarily disabling the WP ULike plugin can serve as a workaround until an update can be applied.