CVE-2024-12322
Published: 07 January 2025
Description
The ThePerfectWedding.nl Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8. This is due to missing or incorrect nonce validation on the 'update_option' function. This makes it possible for unauthenticated attackers to update the 'tpwKey' option with stored cross-site scripting via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Security Summary
CVE-2024-12322 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, affecting the ThePerfectWedding.nl Widget plugin for WordPress in all versions up to and including 2.8. The issue stems from missing or incorrect nonce validation in the 'update_option' function, which allows attackers to update the 'tpwKey' option with stored cross-site scripting (XSS) payloads through a forged request. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-01-07.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity by tricking a site administrator into performing an action, such as clicking a malicious link. Successful exploitation enables the forged request to update the 'tpwKey' option, injecting stored XSS that can lead to high-impact confidentiality, integrity, and availability compromises, such as executing arbitrary scripts in the admin context.
References to the plugin's source code in tpwAdminPanelTemplate.php (lines 4, 5, 28, and 48) highlight the lack of nonce checks, while changeset 3215206 in the WordPress plugin trac repository indicates a patch addressing the issue, recommending administrators update to a fixed version beyond 2.8.
Details
- CWE(s)