Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12322: CWE-352 Cross-Site Request Forgery (CSRF) in theperfectwedding ThePerfectWedding.nl Widget

0
High
VulnerabilityCVE-2024-12322cvecve-2024-12322cwe-352
Published: Tue Jan 07 2025 (01/07/2025, 04:22:22 UTC)
Source: CVE Database V5
Vendor/Project: theperfectwedding
Product: ThePerfectWedding.nl Widget

Description

CVE-2024-12322 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the ThePerfectWedding. nl Widget plugin for WordPress in all versions up to 2. 8. The vulnerability arises from missing or incorrect nonce validation on the 'update_option' function, allowing unauthenticated attackers to trick site administrators into executing forged requests. Exploitation can lead to unauthorized modification of the 'tpwKey' option, enabling stored cross-site scripting (XSS) attacks. This can compromise confidentiality, integrity, and availability of affected WordPress sites. The vulnerability requires user interaction, specifically an administrator clicking a malicious link. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential site takeover or data compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:56:19 UTC

Technical Analysis

CVE-2024-12322 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThePerfectWedding.nl Widget plugin for WordPress, affecting all versions up to and including 2.8. The root cause is the absence or improper implementation of nonce validation on the 'update_option' function within the plugin. Nonces in WordPress are security tokens used to verify the legitimacy of requests and prevent CSRF attacks. Without proper nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious webpage), updates the 'tpwKey' option in the WordPress database. This option can be manipulated to store malicious cross-site scripting (XSS) payloads, which can then be executed in the context of the administrator’s browser. The vulnerability is particularly dangerous because it does not require the attacker to be authenticated, relying instead on social engineering to induce an administrator to perform the action. The CVSS v3.1 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges required, but user interaction needed). Although no known exploits have been reported in the wild, the potential for site compromise, including unauthorized configuration changes and persistent XSS, makes this a critical issue for affected WordPress sites. The vulnerability was publicly disclosed on January 7, 2025, and is tracked under CWE-352 (Cross-Site Request Forgery).

Potential Impact

The impact of CVE-2024-12322 on organizations worldwide is significant due to the potential for unauthorized administrative actions on WordPress sites using the ThePerfectWedding.nl Widget plugin. Successful exploitation can lead to persistent cross-site scripting, allowing attackers to execute arbitrary scripts in the context of site administrators, potentially leading to full site compromise, data theft, or further malware deployment. The integrity of site configurations can be undermined by unauthorized changes to critical options like 'tpwKey'. Confidential information accessible to administrators could be exposed or manipulated. Availability may also be affected if attackers disrupt site functionality or inject malicious code that causes operational failures. Given WordPress's widespread use in small to medium businesses, event planners, and wedding-related services, this vulnerability could impact a broad range of organizations, especially those relying on this specific plugin for their website functionality. The requirement for user interaction (administrator clicking a malicious link) somewhat limits the attack vector but does not eliminate the risk, especially in environments with less security awareness or phishing susceptibility.

Mitigation Recommendations

To mitigate CVE-2024-12322, organizations should immediately update the ThePerfectWedding.nl Widget plugin to a patched version once available. In the absence of an official patch, administrators should consider temporarily disabling or removing the plugin to prevent exploitation. Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'update_option' function or attempts to modify the 'tpwKey' option can provide interim protection. Educate site administrators on the risks of clicking untrusted links and encourage the use of multi-factor authentication (MFA) to reduce the impact of compromised credentials. Regularly audit WordPress options and plugin configurations for unauthorized changes. Additionally, site owners should monitor logs for unusual administrative actions and consider employing security plugins that enforce nonce validation or provide enhanced CSRF protections. Finally, maintain regular backups of site data and configurations to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-06T18:31:37.163Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e36b7ef31ef0b597dc6

Added to database: 2/25/2026, 9:48:38 PM

Last enriched: 2/26/2026, 3:56:19 AM

Last updated: 2/26/2026, 7:14:22 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats