CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8200

Medium Severity
Smashballoon
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00016/1

CVE-2024-8200: A Cross-Site Request Forgery (CSRF) vulnerability exists in the Reviews Feed WordPress plugin, potentially allowing unauthenticated attackers to modify the plugin's API key. This flaw affects versions up to and including 1.1.2 due to insufficient nonce validation in the 'update_api_key' function. An attacker could exploit this by tricking an administrator into clicking a malicious link, leading to the API key being updated with a value of their choosing. Despite a low SVRS score of 30, indicating a less critical immediate threat compared to others, the presence of CWE-352 highlights the fundamental security risk. Successful exploitation could compromise the integrity of the reviews displayed, potentially damaging the website's reputation or injecting malicious content. While the CVSS score is 0, security best practices suggest patching this vulnerability to prevent possible future exploits. Addressing this CSRF issue mitigates the risk of unauthorized API key changes and protects the site from potential manipulation via forged requests. Prompt updating of the plugin is recommended.

In The Wild
2024-08-27

2024-08-30

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-8200 | Reviews Feed Plugin up to 1.1.2 on WordPress cross-site request forgery
vuldb.com2025-03-12
CVE-2024-8200 | Reviews Feed Plugin up to 1.1.2 on WordPress cross-site request forgery | A vulnerability was found in Reviews Feed Plugin up to 1.1.2 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The identification of this vulnerability is CVE-2024-8200. The attack may be initiated remotely. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

CVE-2024-8200 CSRF Vulnerability in WordPress Reviews Feed Plugin Up to 1.1.2 The "Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More" plugin for WordPress has a... https://t.co/OHILmQo15a
0
0
0
🚨 CVE-2024-8200: CSRF flaw found in Reviews Feed Plugin up to 1.1.2 on WordPress. Impact: Attacker could perform unwanted actions on behalf of users. Action: Update to patched version immediately and review logs for signs of exploit. #CyberSecurity #WordPressSecurity
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppSmashballoonreviews_feed

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699
[email protected]https://plugins.trac.wordpress.org/changeset/3125315/
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9e20f7-813c-4691-bce4-d0ff4774ae48?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-352Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence