The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_unset_default_card' function. This makes it possible for unauthenticated attackers to remove the default status of a card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wppdf/ | Not Applicable |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=cve | Third Party Advisory |
| https://wordpress.org/plugins/wppdf/ | Not Applicable |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-28 09:15
Updated : 2025-02-10 14:43
NVD link : CVE-2024-0433
Mitre link : CVE-2024-0433
CVE.ORG link : CVE-2024-0433
JSON object : View
Products Affected
fabrick
- gestpay_for_woocommerce
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
