### [CVE-2024-31430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31430) ![](https://img.shields.io/static/v1?label=Product&message=BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=WOLF%20%E2%80%93%20WordPress%20Posts%20Bulk%20Editor%20and%20Manager%20Professional&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen) ### Description Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net.This issue affects WOLF – WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.1; BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net: from n/a through 1.1.4.1. ### POC #### Reference No PoCs from references. #### Github - https://github.com/20142995/nuclei-templates