Vulnerability Description
The Tourfic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.11.20. This is due to missing or incorrect nonce validation on the tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields functions. This makes it possible for unauthenticated attackers to resend order status emails, update visitor/order details, edit check-in/out details, edit order status, perform bulk order status updates, remove room order IDs, and delete old review fields, respectively, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Themeific | Tourfic | < 2.11.21 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3054266/tourficPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/07fa7b1a-9137-4049-a20Third Party Advisory
FAQ
What is CVE-2024-8319?
CVE-2024-8319 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Tourfic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.11.20. This is due to missing or incorrect nonce validation on the tf_order_status_...
How severe is CVE-2024-8319?
CVE-2024-8319 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8319?
Check the references section above for vendor advisories and patch information. Affected products include: Themeific Tourfic.