The DeBounce Email Validator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.6. This is due to missing or incorrect nonce validation on the 'debounce_email_validator' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/debounce-io-email-validator/ | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/9121ab04-d16b-468b-880f-8f00bcec6489?source=cve | Third Party Advisory |
Configurations
History
26 Feb 2025, 13:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/debounce-io-email-validator/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/9121ab04-d16b-468b-880f-8f00bcec6489?source=cve - Third Party Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:debounce:email_validator:*:*:*:*:*:wordpress:*:* | |
First Time |
Debounce email Validator
Debounce |
19 Feb 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-19 09:15
Updated : 2025-02-26 13:16
NVD link : CVE-2024-13339
Mitre link : CVE-2024-13339
CVE.ORG link : CVE-2024-13339
JSON object : View
Products Affected
debounce
- email_validator
CWE
CWE-352
Cross-Site Request Forgery (CSRF)