CVE-2024-0432

The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_delete_card' function. This makes it possible for unauthenticated attackers to delete the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabrick:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:*

History

10 Feb 2025, 14:47

Type Values Removed Values Added
First Time Fabrick
Fabrick gestpay For Woocommerce
References () https://wordpress.org/plugins/wppdf/ - () https://wordpress.org/plugins/wppdf/ - Not Applicable
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/7561a71a-c3f0-45f1-8230-2c17cbeff916?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/7561a71a-c3f0-45f1-8230-2c17cbeff916?source=cve - Third Party Advisory
CWE CWE-352
CPE cpe:2.3:a:fabrick:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-02-28 09:15

Updated : 2025-02-10 14:47


NVD link : CVE-2024-0432

Mitre link : CVE-2024-0432

CVE.ORG link : CVE-2024-0432


JSON object : View

Products Affected

fabrick

  • gestpay_for_woocommerce
CWE
CWE-352

Cross-Site Request Forgery (CSRF)