Description
Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory geodirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a through <= 2.8.149.
Published: 2026-01-23
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Actions
Action: Patch
AI Analysis

Impact

The GeoDirectory WordPress plugin contains a Cross‑Site Request Forgery (CSRF) flaw that allows attackers to send requests to the plugin without including a valid anti‑CSRF token. Because the plugin accepts these forged requests as legitimate, they are processed as if they were made by an authenticated user. The vulnerability provides no direct code execution, but it enables attackers to trigger actions that normally require a logged‑in user, potentially leading to unintended changes or data exposure.

Affected Systems

All installations of the GeoDirectory WordPress plugin developed by Paolo that run versions up to and including 2.8.149 are affected. Any WordPress site that has this plugin installed and a user signed in can be vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates a medium severity, while the EPSS score of less than 1% suggests a very low likelihood of current exploitation. The plugin is not listed in CISA’s KEV catalog. The likely attack scenario involves a malicious website embedding resources that trigger the vulnerable endpoint while a user remains authenticated; the request is sent automatically by the browser and processed as if the user had submitted it directly. The combination of moderate severity and low exploitation probability means the flaw could cause damage if leveraged in the wild, but the chance of it being exploited currently is low.

Generated by OpenCVE AI on April 16, 2026 at 07:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the GeoDirectory plugin to a version newer than 2.8.149 that contains the CSRF fix.
  • Restrict access to the plugin’s administrative interfaces to the most trusted user roles, limiting the potential impact of any forged requests.
  • Enforce strong authentication practices for site administrators, such as two‑factor authentication, to reduce the risk of compromised accounts being used in CSRF attacks.

Generated by OpenCVE AI on April 16, 2026 at 07:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a before 2.8.150. Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory geodirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a through <= 2.8.149.
Title WordPress GeoDirectory plugin < 2.8.150 - Cross Site Request Forgery (CSRF) vulnerability WordPress GeoDirectory plugin <= 2.8.149 - Cross Site Request Forgery (CSRF) vulnerability

Wed, 28 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory geodirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a through <= 2.8.147. Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a before 2.8.150.
Title WordPress GeoDirectory plugin <= 2.8.147 - Cross Site Request Forgery (CSRF) vulnerability WordPress GeoDirectory plugin < 2.8.150 - Cross Site Request Forgery (CSRF) vulnerability

Tue, 27 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Paolo
Paolo geodirectory
Wordpress
Wordpress wordpress
Vendors & Products Paolo
Paolo geodirectory
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory geodirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a through <= 2.8.147.
Title WordPress GeoDirectory plugin <= 2.8.147 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Paolo Geodirectory
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:49.105Z

Reserved: 2026-01-23T12:31:46.854Z

Link: CVE-2026-24549

cve-icon Vulnrichment

Updated: 2026-01-27T19:56:56.843Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:11.227

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24549

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:45:06Z

Weaknesses