cve/2024/CVE-2024-31430.md

19 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-31430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31430)
![](https://img.shields.io/static/v1?label=Product&message=BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WOLF%20%E2%80%93%20WordPress%20Posts%20Bulk%20Editor%20and%20Manager%20Professional&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net.This issue affects WOLF WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.1; BEAR Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net: from n/a through 1.1.4.1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates