The Pretty Links – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.6.3. This is due to missing or incorrect nonce validation when saving plugin settings. This makes it possible for unauthenticated attackers to change the plugin's configuration including stripe integration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Thu, 10 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Caseproof
Caseproof prettylinks
Weaknesses CWE-352
CPEs cpe:2.3:a:caseproof:prettylinks:*:*:*:*:free:wordpress:*:*
Vendors & Products Caseproof
Caseproof prettylinks

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-04-10T20:09:20.821Z

Reserved: 2024-03-08T16:03:08.349Z

Link: CVE-2024-2326

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.367Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-23T04:15:08.757

Modified: 2025-02-13T16:32:17.897

Link: CVE-2024-2326

cve-icon Redhat

No data.