The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_set_default_card' function. This makes it possible for unauthenticated attackers to set the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Tue, 25 Feb 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabrick
Fabrick gestpay For Woocommerce
Weaknesses CWE-352
CPEs cpe:2.3:a:fabrick:gestpay_for_woocommerce:*:*:*:*:*:wordpress:*:*
Vendors & Products Fabrick
Fabrick gestpay For Woocommerce

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-02-28T08:33:10.023Z

Updated: 2024-08-01T18:04:49.791Z

Reserved: 2024-01-11T16:20:47.694Z

Link: CVE-2024-0431

cve-icon Vulnrichment

Updated: 2024-08-01T18:04:49.791Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-28T09:15:40.863

Modified: 2025-02-25T22:55:39.437

Link: CVE-2024-0431

cve-icon Redhat

No data.