Vulnerability Details CVE-2024-7423
The Stream plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.1. This is due to missing or incorrect nonce validation on the network_options_action() function. This makes it possible for unauthenticated attackers to update arbitrary options that can lead to DoS or privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.8%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2024-7423
-
-
cpe:2.3:a:xwp:stream:0.1.0
-
cpe:2.3:a:xwp:stream:0.2.0
-
cpe:2.3:a:xwp:stream:0.3.0
-
cpe:2.3:a:xwp:stream:0.4.0
-
cpe:2.3:a:xwp:stream:0.5.0
-
cpe:2.3:a:xwp:stream:0.6.0
-
cpe:2.3:a:xwp:stream:0.7.0
-
cpe:2.3:a:xwp:stream:0.7.1
-
cpe:2.3:a:xwp:stream:0.7.2
-
cpe:2.3:a:xwp:stream:0.7.3
-
cpe:2.3:a:xwp:stream:0.8.0
-
cpe:2.3:a:xwp:stream:0.8.1
-
cpe:2.3:a:xwp:stream:0.8.2
-
cpe:2.3:a:xwp:stream:0.9.0
-
cpe:2.3:a:xwp:stream:0.9.1
-
cpe:2.3:a:xwp:stream:0.9.2
-
cpe:2.3:a:xwp:stream:0.9.3
-
cpe:2.3:a:xwp:stream:0.9.4
-
cpe:2.3:a:xwp:stream:0.9.5
-
cpe:2.3:a:xwp:stream:0.9.6
-
cpe:2.3:a:xwp:stream:0.9.7
-
cpe:2.3:a:xwp:stream:0.9.8
-
cpe:2.3:a:xwp:stream:0.9.9
-
cpe:2.3:a:xwp:stream:1.0.0
-
cpe:2.3:a:xwp:stream:1.0.1
-
cpe:2.3:a:xwp:stream:1.0.2
-
cpe:2.3:a:xwp:stream:1.0.3
-
cpe:2.3:a:xwp:stream:1.0.4
-
cpe:2.3:a:xwp:stream:1.0.5
-
cpe:2.3:a:xwp:stream:1.0.6
-
cpe:2.3:a:xwp:stream:1.0.7
-
cpe:2.3:a:xwp:stream:1.0.8
-
cpe:2.3:a:xwp:stream:1.0.9
-
cpe:2.3:a:xwp:stream:1.1.0
-
cpe:2.3:a:xwp:stream:1.1.2
-
cpe:2.3:a:xwp:stream:1.1.3
-
cpe:2.3:a:xwp:stream:1.1.4
-
cpe:2.3:a:xwp:stream:1.1.5
-
cpe:2.3:a:xwp:stream:1.1.6
-
cpe:2.3:a:xwp:stream:1.1.7
-
cpe:2.3:a:xwp:stream:1.1.8
-
cpe:2.3:a:xwp:stream:1.1.9
-
cpe:2.3:a:xwp:stream:1.2.0
-
cpe:2.3:a:xwp:stream:1.2.1
-
cpe:2.3:a:xwp:stream:1.2.2
-
cpe:2.3:a:xwp:stream:1.2.3
-
cpe:2.3:a:xwp:stream:1.2.4
-
cpe:2.3:a:xwp:stream:1.2.5
-
cpe:2.3:a:xwp:stream:1.2.6
-
cpe:2.3:a:xwp:stream:1.2.7
-
cpe:2.3:a:xwp:stream:1.2.8
-
cpe:2.3:a:xwp:stream:1.2.9
-
cpe:2.3:a:xwp:stream:1.3.0
-
cpe:2.3:a:xwp:stream:1.3.1
-
cpe:2.3:a:xwp:stream:1.4.0
-
cpe:2.3:a:xwp:stream:1.4.1
-
cpe:2.3:a:xwp:stream:1.4.2
-
cpe:2.3:a:xwp:stream:1.4.3
-
cpe:2.3:a:xwp:stream:1.4.4
-
cpe:2.3:a:xwp:stream:1.4.5
-
cpe:2.3:a:xwp:stream:1.4.6
-
cpe:2.3:a:xwp:stream:1.4.7
-
cpe:2.3:a:xwp:stream:1.4.8
-
cpe:2.3:a:xwp:stream:1.4.9
-
cpe:2.3:a:xwp:stream:2.0.0
-
cpe:2.3:a:xwp:stream:2.0.1
-
cpe:2.3:a:xwp:stream:2.0.2
-
cpe:2.3:a:xwp:stream:2.0.3
-
cpe:2.3:a:xwp:stream:2.0.4
-
cpe:2.3:a:xwp:stream:2.0.5
-
cpe:2.3:a:xwp:stream:3.0.0
-
cpe:2.3:a:xwp:stream:3.0.1
-
cpe:2.3:a:xwp:stream:3.0.2
-
cpe:2.3:a:xwp:stream:3.0.3
-
cpe:2.3:a:xwp:stream:3.0.4
-
cpe:2.3:a:xwp:stream:3.0.5
-
cpe:2.3:a:xwp:stream:3.0.6
-
cpe:2.3:a:xwp:stream:3.0.7
-
-
cpe:2.3:a:xwp:stream:3.1.1
-
cpe:2.3:a:xwp:stream:3.10.0
-
cpe:2.3:a:xwp:stream:3.2.0
-
cpe:2.3:a:xwp:stream:3.2.1
-
cpe:2.3:a:xwp:stream:3.2.2
-
cpe:2.3:a:xwp:stream:3.2.3
-
cpe:2.3:a:xwp:stream:3.3.0
-
cpe:2.3:a:xwp:stream:3.4.0
-
cpe:2.3:a:xwp:stream:3.4.1
-
cpe:2.3:a:xwp:stream:3.4.2
-
cpe:2.3:a:xwp:stream:3.4.3
-
cpe:2.3:a:xwp:stream:3.5.0
-
cpe:2.3:a:xwp:stream:3.5.1
-
cpe:2.3:a:xwp:stream:3.6.0
-
cpe:2.3:a:xwp:stream:3.6.1
-
cpe:2.3:a:xwp:stream:3.6.2
-
cpe:2.3:a:xwp:stream:3.7.0
-
cpe:2.3:a:xwp:stream:3.8.0
-
cpe:2.3:a:xwp:stream:3.8.1
-
cpe:2.3:a:xwp:stream:3.8.2
-
cpe:2.3:a:xwp:stream:3.9.0
-
cpe:2.3:a:xwp:stream:3.9.1
-
cpe:2.3:a:xwp:stream:3.9.2
-
cpe:2.3:a:xwp:stream:3.9.3
-
cpe:2.3:a:xwp:stream:4.0.0
-
cpe:2.3:a:xwp:stream:4.0.1