cve/2024/CVE-2024-31430.md
2025-09-29 21:09:30 +02:00

19 lines
1.2 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-31430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31430)
![](https://img.shields.io/static/v1?label=Product&message=BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WOLF%20%E2%80%93%20WordPress%20Posts%20Bulk%20Editor%20and%20Manager%20Professional&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen)
### Description
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net.This issue affects WOLF WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.1; BEAR Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net: from n/a through 1.1.4.1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates