Vulnerability Details CVE-2024-1501
The Database Reset plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.22. This is due to missing or incorrect nonce validation on the install_wpr() function. This makes it possible for unauthenticated attackers to install the WP Reset Plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.3%
CVSS Severity
CVSS v3 Score 4.7
Products affected by CVE-2024-1501
-
cpe:2.3:a:webfactoryltd:wp_database_reset:-
-
cpe:2.3:a:webfactoryltd:wp_database_reset:1.0
-
cpe:2.3:a:webfactoryltd:wp_database_reset:1.2
-
cpe:2.3:a:webfactoryltd:wp_database_reset:1.3
-
cpe:2.3:a:webfactoryltd:wp_database_reset:1.4
-
cpe:2.3:a:webfactoryltd:wp_database_reset:2.0
-
cpe:2.3:a:webfactoryltd:wp_database_reset:2.1
-
cpe:2.3:a:webfactoryltd:wp_database_reset:2.2
-
cpe:2.3:a:webfactoryltd:wp_database_reset:2.3
-
cpe:2.3:a:webfactoryltd:wp_database_reset:2.3.1
-
cpe:2.3:a:webfactoryltd:wp_database_reset:2.3.2
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.0.0
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.0.1
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.0.2
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.1
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.15
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.16
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.17
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.18
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.19
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.20
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.21
-
cpe:2.3:a:webfactoryltd:wp_database_reset:3.22