CVE-2024-3238
Description
The WordPress Menu Plugin — Superfly Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.29. This is due to missing or incorrect nonce validation on the ajax_handle_delete_icons() function. This makes it possible for unauthenticated attackers to delete arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please not the CSRF was patched in 5.0.28, however, adequate directory traversal protection wasn't introduced until 5.0.30.
CWE
- CWE-352 — CWE-352 Cross-Site Request Forgery (CSRF)
Affected
- looks_awesome / WordPress Menu Plugin — Superfly Responsive Menu — v=0 ≤5.0.29 [affected]
CVSS
- 3.1 score=8.8 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3608fce3-0869-4516-ae08-68108f733c37?source=cve
- https://codecanyon.net/item/superfly-responsive-wordpress-menu-plugin/8012790
Source
cvelistV5-main/cves/2024/3xxx/CVE-2024-3238.json