CVE-2024-32095
WordPress MultiParcels Shipping For WooCommerce plugin < 1.16.9 - Cross Site Request Forgery (CSRF) vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Cross-Site Request Forgery (CSRF) vulnerability in MultiParcels MultiParcels Shipping For WooCommerce.This issue affects MultiParcels Shipping For WooCommerce: from n/a before 1.16.9.
Vulnerabilidad de Cross-Site Request Forgery (CSRF) en MultiParcels MultiParcels Shipping For WooCommerce. Este problema afecta a MultiParcels Shipping For WooCommerce: desde n/a antes de 1.16.9.
The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to 1.16.9 (exclusive). This is due to missing or incorrect nonce validation on an unknown function. This makes it possible for unauthenticated attackers to perform an unknown action granted they can trick a site administrator into performing an action such as clicking on a link. The impact of this vulnerability is unknown.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-10 CVE Reserved
- 2024-04-11 CVE Published
- 2024-04-16 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Multiparcels Shipping For Woocommerce Search vendor "Multiparcels Shipping For Woocommerce" | Multiparcels Shipping For Woocommerce Search vendor "Multiparcels Shipping For Woocommerce" for product "Multiparcels Shipping For Woocommerce" | >= 0.0.0 < 1.16.9 Search vendor "Multiparcels Shipping For Woocommerce" for product "Multiparcels Shipping For Woocommerce" and version " >= 0.0.0 < 1.16.9" | en |
Affected
|