The Houzez Property Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.21. This is due to missing or incorrect nonce validation on the "deleteexport" action. This makes it possible for unauthenticated attackers to delete property feed exports via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wp-property-hive
Wp-property-hive houzez Property Feed |
|
CPEs | cpe:2.3:a:wp-property-hive:houzez_property_feed:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wp-property-hive
Wp-property-hive houzez Property Feed |
Wed, 12 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Feb 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Houzez Property Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.21. This is due to missing or incorrect nonce validation on the "deleteexport" action. This makes it possible for unauthenticated attackers to delete property feed exports via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | Houzez Property Feed <= 2.4.21 - Cross-Site Request Forgery to Property Feed Export Deletion | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-12T15:03:49.701Z
Reserved: 2025-01-28T15:09:43.326Z
Link: CVE-2025-0808

Updated: 2025-02-12T15:03:39.404Z

Status : Analyzed
Published: 2025-02-12T04:15:09.950
Modified: 2025-02-25T03:55:57.003
Link: CVE-2025-0808

No data.