The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_unset_default_card' function. This makes it possible for unauthenticated attackers to remove the default status of a card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/wppdf/ | Not Applicable |
https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=cve | Third Party Advisory |
https://wordpress.org/plugins/wppdf/ | Not Applicable |
https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=cve | Third Party Advisory |
Configurations
History
10 Feb 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fabrick
Fabrick gestpay For Woocommerce |
|
CPE | cpe:2.3:a:fabrick:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-352 | |
References | () https://wordpress.org/plugins/wppdf/ - Not Applicable | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=cve - Third Party Advisory |
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/wppdf/ - | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=cve - | |
Summary |
|
28 Feb 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-28 09:15
Updated : 2025-02-10 14:43
NVD link : CVE-2024-0433
Mitre link : CVE-2024-0433
CVE.ORG link : CVE-2024-0433
JSON object : View
Products Affected
fabrick
- gestpay_for_woocommerce
CWE
CWE-352
Cross-Site Request Forgery (CSRF)