Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13356: CWE-352 Cross-Site Request Forgery (CSRF) in mlfactory DSGVO All in one for WP

0
Medium
VulnerabilityCVE-2024-13356cvecve-2024-13356cwe-352
Published: Tue Feb 04 2025 (02/04/2025, 09:21:06 UTC)
Source: CVE Database V5
Vendor/Project: mlfactory
Product: DSGVO All in one for WP

Description

CVE-2024-13356 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the DSGVO All in one for WP WordPress plugin up to version 4. 6. The flaw arises from missing or incorrect nonce validation in the user_remove_form. php file, allowing unauthenticated attackers to trick site administrators into deleting admin user accounts via forged requests. Exploitation requires user interaction, specifically an admin clicking a malicious link. The vulnerability has a CVSS 3. 1 score of 6. 5, indicating medium severity, with a high impact on integrity but no impact on confidentiality or availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized admin account deletions, which could lead to loss of administrative control over WordPress sites.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:59:28 UTC

Technical Analysis

CVE-2024-13356 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability identified in the DSGVO All in one for WP plugin for WordPress, affecting all versions up to and including 4.6. The vulnerability stems from missing or incorrect nonce validation in the user_remove_form.php file, which is responsible for handling admin user removal requests. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third-party sites. The absence or improper implementation of nonce validation allows an attacker to craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), results in the deletion of admin user accounts without their explicit consent. This attack does not require the attacker to be authenticated but does require user interaction from an admin. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) reflects that the attack can be launched remotely over the network with low complexity, no privileges required, but requires user interaction. The impact is high on integrity because admin accounts can be deleted, potentially locking out legitimate administrators and compromising site management. There is no direct impact on confidentiality or availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple administrators or high-value content. The vulnerability was published on February 4, 2025, and is assigned by Wordfence. No official patches or updates are listed, so mitigation may require manual intervention or plugin updates once available.

Potential Impact

The primary impact of this vulnerability is the unauthorized deletion of administrator user accounts on WordPress sites using the affected DSGVO All in one for WP plugin. This can lead to loss of administrative control, preventing legitimate admins from managing the site, applying security updates, or responding to incidents. Such a loss of control can facilitate further attacks, including site defacement, data manipulation, or installation of malicious code by attackers who gain access through other means. Since the attack requires an admin to interact with a malicious link, social engineering is a key factor, increasing the risk in environments where admins may be targeted via phishing. The integrity of the site is severely compromised, but confidentiality and availability are not directly affected by this vulnerability. Organizations relying on this plugin, especially those with multiple administrators or high-profile WordPress sites, face increased risk of site takeover or disruption of site management.

Mitigation Recommendations

Organizations should immediately verify if they are using the DSGVO All in one for WP plugin version 4.6 or earlier and plan to update to a patched version once available. In the absence of an official patch, administrators should implement the following mitigations: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks. 2) Educate administrators about the risks of clicking on unsolicited or suspicious links, especially those received via email or messaging platforms. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the user_remove_form.php endpoint. 4) Manually inspect and harden the plugin code by adding proper nonce validation in the user removal functionality if feasible. 5) Regularly back up WordPress user data and site configurations to enable quick recovery if admin accounts are deleted. 6) Monitor admin account changes and set up alerts for unexpected deletions or modifications. These steps will help reduce the risk of exploitation until an official patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T15:50:13.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e51b7ef31ef0b59e277

Added to database: 2/25/2026, 9:49:05 PM

Last enriched: 2/26/2026, 1:59:28 AM

Last updated: 2/26/2026, 6:36:28 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats