The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_set_default_card' function. This makes it possible for unauthenticated attackers to set the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fabrick
Fabrick gestpay For Woocommerce |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:fabrick:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Fabrick
Fabrick gestpay For Woocommerce |

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-02-28T08:33:10.023Z
Updated: 2024-08-01T18:04:49.791Z
Reserved: 2024-01-11T16:20:47.694Z
Link: CVE-2024-0431

Updated: 2024-08-01T18:04:49.791Z

Status : Analyzed
Published: 2024-02-28T09:15:40.863
Modified: 2025-02-25T22:55:39.437
Link: CVE-2024-0431

No data.