The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Tue, 15 Oct 2024 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Brevo
Brevo newsletter\, Smtp\, Email Marketing And Subscribe
CPEs cpe:2.3:a:brevo:newsletter\,_smtp\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*
Vendors & Products Brevo
Brevo newsletter\, Smtp\, Email Marketing And Subscribe

Thu, 10 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 02:45:00 +0000

Type Values Removed Values Added
Description The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) <= 3.1.87 - Cross-Site Request Forgery
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-10T02:06:12.095Z

Updated: 2024-10-10T14:27:25.509Z

Reserved: 2024-09-05T14:49:05.466Z

Link: CVE-2024-8477

cve-icon Vulnrichment

Updated: 2024-10-10T14:27:20.016Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-10T03:15:02.300

Modified: 2024-10-15T13:30:52.877

Link: CVE-2024-8477

cve-icon Redhat

No data.