CVE-2024-13826

The Email Keep WordPress plugin through 1.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Configurations

Configuration 1 (hide)

cpe:2.3:a:intricateweb:email_keep:*:*:*:*:*:wordpress:*:*

History

06 May 2025, 16:16

Type Values Removed Values Added
CPE cpe:2.3:a:intricateweb:email_keep:*:*:*:*:*:wordpress:*:*
CWE CWE-352
References () https://wpscan.com/vulnerability/56b143b6-e5db-4037-ab2a-4e4d0cb7a005/ - () https://wpscan.com/vulnerability/56b143b6-e5db-4037-ab2a-4e4d0cb7a005/ - Exploit, Third Party Advisory
First Time Intricateweb
Intricateweb email Keep

10 Mar 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://wpscan.com/vulnerability/56b143b6-e5db-4037-ab2a-4e4d0cb7a005/ - () https://wpscan.com/vulnerability/56b143b6-e5db-4037-ab2a-4e4d0cb7a005/ -
Summary
  • (es) El complemento Email Keep WordPress hasta la versión 1.1 no tiene una verificación CSRF activada al actualizar sus configuraciones, lo que podría permitir a los atacantes hacer que un administrador que haya iniciado sesión las cambie mediante un ataque CSRF.

08 Mar 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-08 06:15

Updated : 2025-05-06 16:16


NVD link : CVE-2024-13826

Mitre link : CVE-2024-13826

CVE.ORG link : CVE-2024-13826


JSON object : View

Products Affected

intricateweb

  • email_keep
CWE
CWE-352

Cross-Site Request Forgery (CSRF)