MEDIUM · 4.3

CVE-2024-31430

Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR – Bulk Editor and Products Manager Professional for WooCommer...

Vulnerability Description

Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net.This issue affects WOLF – WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.1; BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net: from n/a through 1.1.4.1.

CVSS Score

4.3

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
PluginusBear - Woocommerce Bulk Editor And Products Manager Professional< 1.1.4.2
PluginusWolf - Wordpress Posts Bulk Editor And Products Manager Professional< 1.0.8.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-31430?

CVE-2024-31430 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR – Bulk Editor and Products Manager Professional for WooCommer...

How severe is CVE-2024-31430?

CVE-2024-31430 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-31430?

Check the references section above for vendor advisories and patch information. Affected products include: Pluginus Bear - Woocommerce Bulk Editor And Products Manager Professional, Pluginus Wolf - Wordpress Posts Bulk Editor And Products Manager Professional.