The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
Configuration 1 (hide)
|
History
15 Oct 2024, 13:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Brevo newsletter\, Smtp\, Email Marketing And Subscribe
Brevo |
|
CPE | cpe:2.3:a:brevo:newsletter\,_smtp\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/changeset/3165451/mailin/tags/3.1.88/page/page-home.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/e070b422-9036-4362-832b-43fd4838f394?source=cve - Third Party Advisory |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Oct 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-10 03:15
Updated : 2024-10-15 13:30
NVD link : CVE-2024-8477
Mitre link : CVE-2024-8477
CVE.ORG link : CVE-2024-8477
JSON object : View
Products Affected
brevo
- newsletter\,_smtp\,_email_marketing_and_subscribe
CWE
CWE-352
Cross-Site Request Forgery (CSRF)