Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12219: CWE-352 Cross-Site Request Forgery (CSRF) in tomroyal Stop Registration Spam

0
Medium
VulnerabilityCVE-2024-12219cvecve-2024-12219cwe-352
Published: Tue Dec 17 2024 (12/17/2024, 07:23:15 UTC)
Source: CVE Database V5
Vendor/Project: tomroyal
Product: Stop Registration Spam

Description

CVE-2024-12219 is a Cross-Site Request Forgery (CSRF) vulnerability affecting all versions of the tomroyal Stop Registration Spam WordPress plugin up to 1. 23. The flaw arises from missing or incorrect nonce validation, allowing unauthenticated attackers to trick site administrators into executing unwanted actions by clicking malicious links. Exploitation requires user interaction but no authentication, enabling attackers to inject malicious web scripts that can alter plugin behavior or site registration controls. The vulnerability has a CVSS score of 6. 1, indicating medium severity, with impacts primarily on confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent unauthorized changes to registration spam controls. Countries with significant WordPress usage and high adoption of this plugin are at greater risk, especially where targeted attacks on content management systems are common.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:00:16 UTC

Technical Analysis

The Stop Registration Spam plugin by tomroyal for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2024-12219. This vulnerability exists in all versions up to and including 1.23 due to missing or incorrect nonce validation mechanisms. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from forged sources. The absence or improper implementation of nonce checks allows attackers to craft malicious web requests that, when executed by an authenticated site administrator (via clicking a link or visiting a malicious page), perform unauthorized actions within the plugin. These actions could include altering spam registration settings or injecting malicious scripts that compromise site integrity. The vulnerability requires no prior authentication but does require user interaction, specifically the administrator clicking a malicious link. The CVSS 3.1 base score is 6.1, reflecting medium severity with attack vector as network, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. No public exploits are currently known, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with high administrative traffic and exposure. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation.

Potential Impact

This vulnerability can lead to unauthorized changes in the Stop Registration Spam plugin settings, potentially allowing attackers to bypass spam protections or inject malicious scripts that compromise site confidentiality and integrity. While availability is not affected, the unauthorized modification of spam controls can degrade site security and user trust. Attackers could exploit this to facilitate further attacks such as spam registrations, phishing, or malware distribution. Organizations relying on this plugin for spam prevention may experience increased spam registrations, data leakage, or site defacement. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with high administrator activity. The medium severity rating reflects a moderate but significant threat, particularly for high-profile or high-traffic WordPress sites.

Mitigation Recommendations

Administrators should immediately verify if their WordPress sites use the tomroyal Stop Registration Spam plugin and identify the version installed. Until an official patch is released, consider temporarily disabling the plugin or restricting administrative access to trusted networks to reduce exposure. Implement additional web application firewall (WAF) rules to detect and block suspicious CSRF attempts targeting plugin endpoints. Educate site administrators about the risks of clicking unknown or suspicious links, especially when logged into WordPress admin panels. Monitor site logs for unusual changes to spam registration settings or unexpected administrative actions. Once a patch is available, promptly update the plugin to the fixed version. Additionally, site owners can implement custom nonce validation or CSRF protection mechanisms at the web server or application level as an interim safeguard.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-04T22:52:20.447Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e32b7ef31ef0b597991

Added to database: 2/25/2026, 9:48:34 PM

Last enriched: 2/26/2026, 6:00:16 AM

Last updated: 2/26/2026, 6:18:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats