### [CVE-2024-13826](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13826) ![](https://img.shields.io/static/v1?label=Product&message=Email%20Keep&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brightgreen) ### Description The Email Keep WordPress plugin through 1.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack ### POC #### Reference - https://wpscan.com/vulnerability/56b143b6-e5db-4037-ab2a-4e4d0cb7a005/ #### Github No PoCs found on GitHub currently.