CVE-2024-12206: CWE-352 Cross-Site Request Forgery (CSRF) in stylemix WordPress Header Builder Plugin – Pearl
CVE-2024-12206 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress Header Builder Plugin – Pearl up to version 1. 3. 8. The vulnerability arises from missing or incorrect nonce validation on the stm_header_builder page, allowing unauthenticated attackers to trick site administrators into executing unwanted actions, such as deleting arbitrary headers. Exploitation requires user interaction, specifically the administrator clicking a crafted link. While the vulnerability does not impact confidentiality or availability, it can affect the integrity of the website's header configurations. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or implementing nonce validation to prevent unauthorized header modifications. The threat primarily affects WordPress sites globally, with higher risk in countries with widespread WordPress usage and significant web presence. Given the ease of exploitation and potential impact on site integrity, the severity is assessed as medium.
AI Analysis
Technical Summary
CVE-2024-12206 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Header Builder Plugin – Pearl, versions up to and including 1.3.8. The root cause is the absence or improper implementation of nonce validation on the stm_header_builder administrative page. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (for example, by clicking a specially crafted link), causes the deletion of arbitrary headers configured via the plugin. This vulnerability does not require the attacker to be authenticated but does require the administrator's interaction, making social engineering a key component of exploitation. The CVSS v3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, but requiring user interaction, and impacting integrity only. The vulnerability does not affect confidentiality or availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The plugin is widely used in WordPress sites for header customization, making the vulnerability relevant to many websites that rely on this plugin for their header management.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of website header configurations, which can affect the integrity of the site’s presentation and potentially disrupt functionality dependent on header settings. While it does not directly compromise sensitive data or availability, unauthorized header deletion can degrade user experience, break site layouts, or interfere with security headers that protect against other attacks (e.g., Content Security Policy headers). For organizations, this could lead to reputational damage, increased support costs, and potential secondary attacks if security headers are removed or altered. Since exploitation requires tricking an administrator, the risk is higher in environments where administrators frequently interact with untrusted content or links. The vulnerability affects all sites using the vulnerable versions of the plugin, which may include small businesses, blogs, and larger enterprises relying on WordPress for their web presence.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WordPress Header Builder Plugin – Pearl to a version that includes proper nonce validation once available. In the absence of an official patch, site administrators can implement manual nonce checks on the stm_header_builder page by customizing the plugin code or using security plugins that enforce nonce validation on administrative actions. Additionally, administrators should be trained to avoid clicking on suspicious links and implement multi-factor authentication (MFA) to reduce the risk of session hijacking. Web Application Firewalls (WAFs) can be configured to detect and block suspicious POST requests targeting the header builder endpoints. Regular security audits and monitoring of administrative actions can help detect unauthorized changes early. Finally, limiting administrative access to trusted networks and users reduces the attack surface for CSRF attacks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-12206: CWE-352 Cross-Site Request Forgery (CSRF) in stylemix WordPress Header Builder Plugin – Pearl
Description
CVE-2024-12206 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress Header Builder Plugin – Pearl up to version 1. 3. 8. The vulnerability arises from missing or incorrect nonce validation on the stm_header_builder page, allowing unauthenticated attackers to trick site administrators into executing unwanted actions, such as deleting arbitrary headers. Exploitation requires user interaction, specifically the administrator clicking a crafted link. While the vulnerability does not impact confidentiality or availability, it can affect the integrity of the website's header configurations. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or implementing nonce validation to prevent unauthorized header modifications. The threat primarily affects WordPress sites globally, with higher risk in countries with widespread WordPress usage and significant web presence. Given the ease of exploitation and potential impact on site integrity, the severity is assessed as medium.
AI-Powered Analysis
Technical Analysis
CVE-2024-12206 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Header Builder Plugin – Pearl, versions up to and including 1.3.8. The root cause is the absence or improper implementation of nonce validation on the stm_header_builder administrative page. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (for example, by clicking a specially crafted link), causes the deletion of arbitrary headers configured via the plugin. This vulnerability does not require the attacker to be authenticated but does require the administrator's interaction, making social engineering a key component of exploitation. The CVSS v3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, but requiring user interaction, and impacting integrity only. The vulnerability does not affect confidentiality or availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The plugin is widely used in WordPress sites for header customization, making the vulnerability relevant to many websites that rely on this plugin for their header management.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of website header configurations, which can affect the integrity of the site’s presentation and potentially disrupt functionality dependent on header settings. While it does not directly compromise sensitive data or availability, unauthorized header deletion can degrade user experience, break site layouts, or interfere with security headers that protect against other attacks (e.g., Content Security Policy headers). For organizations, this could lead to reputational damage, increased support costs, and potential secondary attacks if security headers are removed or altered. Since exploitation requires tricking an administrator, the risk is higher in environments where administrators frequently interact with untrusted content or links. The vulnerability affects all sites using the vulnerable versions of the plugin, which may include small businesses, blogs, and larger enterprises relying on WordPress for their web presence.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WordPress Header Builder Plugin – Pearl to a version that includes proper nonce validation once available. In the absence of an official patch, site administrators can implement manual nonce checks on the stm_header_builder page by customizing the plugin code or using security plugins that enforce nonce validation on administrative actions. Additionally, administrators should be trained to avoid clicking on suspicious links and implement multi-factor authentication (MFA) to reduce the risk of session hijacking. Web Application Firewalls (WAFs) can be configured to detect and block suspicious POST requests targeting the header builder endpoints. Regular security audits and monitoring of administrative actions can help detect unauthorized changes early. Finally, limiting administrative access to trusted networks and users reduces the attack surface for CSRF attacks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-04T17:37:36.187Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e31b7ef31ef0b59784c
Added to database: 2/25/2026, 9:48:33 PM
Last enriched: 2/26/2026, 6:01:47 AM
Last updated: 2/26/2026, 6:39:52 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.