Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12554: CWE-352 Cross-Site Request Forgery (CSRF) in pkthree Peter’s Custom Anti-Spam

0
Medium
VulnerabilityCVE-2024-12554cvecve-2024-12554cwe-352
Published: Wed Dec 18 2024 (12/18/2024, 09:22:39 UTC)
Source: CVE Database V5
Vendor/Project: pkthree
Product: Peter’s Custom Anti-Spam

Description

CVE-2024-12554 is a Cross-Site Request Forgery (CSRF) vulnerability in the Peter’s Custom Anti-Spam WordPress plugin up to version 3. 2. 3. The flaw arises from missing nonce validation in the cas_register_post() function, allowing unauthenticated attackers to trick site administrators into blacklisting emails via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity and availability of the anti-spam functionality but does not affect confidentiality. The CVSS score is 5. 4 (medium severity), reflecting the moderate impact and ease of exploitation without authentication but requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should apply patches or implement nonce validation to mitigate the risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:44:29 UTC

Technical Analysis

CVE-2024-12554 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Peter’s Custom Anti-Spam plugin for WordPress, affecting all versions up to and including 3.2.3. The vulnerability stems from the absence of nonce validation in the cas_register_post() function, which is responsible for registering blacklisted emails. Nonce validation is a security measure that ensures requests are legitimate and initiated by authorized users. Without it, attackers can craft malicious requests that, when executed by an authenticated administrator (typically by clicking a specially crafted link), cause the system to blacklist arbitrary email addresses. This attack does not require the attacker to be authenticated but does require the victim administrator’s interaction. The vulnerability impacts the integrity of the anti-spam system by allowing unauthorized modification of blacklists and may affect availability if legitimate emails are blacklisted erroneously. The CVSS 3.1 base score of 5.4 reflects a network attack vector, low attack complexity, no privileges required, but requiring user interaction, with no confidentiality impact but low integrity and availability impacts. No patches are currently linked, and no exploits are known in the wild, indicating the vulnerability is newly disclosed. The plugin is widely used in WordPress environments, which are common targets for web-based attacks, making this a relevant concern for website administrators and security teams.

Potential Impact

The primary impact of this vulnerability is on the integrity and availability of the anti-spam functionality within affected WordPress sites. Attackers can cause administrators to unknowingly blacklist legitimate email addresses, potentially disrupting communication and causing denial of service for legitimate users. Although confidentiality is not directly impacted, the manipulation of blacklists can degrade trust in the site's email filtering and spam prevention capabilities. For organizations relying on this plugin, this could lead to operational disruptions, increased support costs, and reputational damage if legitimate communications are blocked. Since exploitation requires administrator interaction, the risk is somewhat mitigated but remains significant in environments where administrators may be targeted via phishing or social engineering. The vulnerability could be leveraged as part of a broader attack chain, for example, to disrupt communications or facilitate phishing campaigns by blocking security notifications or legitimate user emails.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Peter’s Custom Anti-Spam plugin to a version that includes nonce validation in the cas_register_post() function once available. Until a patch is released, administrators should implement manual nonce validation or other CSRF protections in the plugin code if feasible. Additionally, administrators should be trained to recognize and avoid clicking suspicious links, especially those received via email or untrusted sources. Employing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide an additional layer of defense. Regularly auditing plugin permissions and limiting administrator access can reduce the risk of exploitation. Monitoring logs for unusual blacklist changes may help detect attempted attacks. Finally, maintaining an overall strong security posture for WordPress sites, including timely updates and backups, will help mitigate the broader risks associated with this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-11T21:57:05.008Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e41b7ef31ef0b59bca8

Added to database: 2/25/2026, 9:48:49 PM

Last enriched: 2/26/2026, 3:44:29 AM

Last updated: 2/26/2026, 7:37:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats