Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13405: CWE-352 Cross-Site Request Forgery (CSRF) in apptivo Apptivo Business Site CRM

0
Medium
VulnerabilityCVE-2024-13405cvecve-2024-13405cwe-352
Published: Wed Feb 19 2025 (02/19/2025, 07:32:15 UTC)
Source: CVE Database V5
Vendor/Project: apptivo
Product: Apptivo Business Site CRM

Description

CVE-2024-13405 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability in the Apptivo Business Site CRM WordPress plugin affecting all versions up to 5. 3. The flaw arises from missing or incorrect nonce validation on the 'awp_ip_deny' page, allowing unauthenticated attackers to trick site administrators into executing forged requests. Successful exploitation enables attackers to block IP addresses without authorization, potentially disrupting legitimate user access. Exploitation requires user interaction, specifically the administrator clicking a crafted link. There are no known exploits in the wild at this time. The vulnerability impacts the integrity of the system but does not affect confidentiality or availability directly. Mitigation involves implementing proper nonce validation and educating administrators to avoid clicking suspicious links. Organizations using this plugin should prioritize patching or applying workarounds to prevent unauthorized IP blocking actions.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:27:38 UTC

Technical Analysis

CVE-2024-13405 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Apptivo Business Site CRM plugin for WordPress, affecting all versions up to and including 5.3. The vulnerability stems from missing or incorrect nonce validation on the 'awp_ip_deny' administrative page, which is responsible for managing IP address blocking. Nonce tokens are security mechanisms designed to ensure that requests made to sensitive actions originate from legitimate users and not from malicious third-party sites. In this case, the absence or improper implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, when executed by a logged-in site administrator (through actions like clicking a link), results in the blocking of arbitrary IP addresses. This attack vector leverages the trust relationship between the administrator's browser and the WordPress site, exploiting the administrator's authenticated session. The vulnerability does not require the attacker to have any privileges or direct access to the site, but it does require user interaction from an administrator. The CVSS 3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but a moderate impact on integrity due to unauthorized IP blocking. No known public exploits have been reported yet, but the vulnerability poses a risk to site administration and network accessibility controls. The issue highlights the importance of proper nonce implementation in WordPress plugins to prevent CSRF attacks.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the Apptivo Business Site CRM plugin. Attackers can cause unauthorized changes to IP blocking rules, potentially locking out legitimate users or administrators by blocking their IP addresses. This could disrupt normal site operations, hinder administrative access, and degrade user experience. While the vulnerability does not directly compromise data confidentiality or availability, the ability to manipulate IP blocking could be leveraged as part of a broader attack strategy, such as denial of service against specific users or administrators. Organizations relying on this plugin for CRM functions may face operational disruptions and increased administrative overhead to restore normal access. The requirement for administrator interaction limits the attack scope but does not eliminate risk, especially in environments where administrators may be targeted with phishing or social engineering attacks. Overall, the threat could lead to temporary loss of control over site access and potential reputational damage if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Apptivo Business Site CRM plugin to a version that includes proper nonce validation on the 'awp_ip_deny' page once a patch is released. Until an official patch is available, administrators should be advised to avoid clicking on suspicious or unsolicited links, especially those that could trigger administrative actions. Implementing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting the affected endpoint can provide temporary protection. Additionally, administrators should enforce the principle of least privilege, limiting the number of users with administrative rights to reduce exposure. Monitoring and logging of IP blocking actions can help detect unauthorized changes quickly. Finally, educating site administrators about CSRF risks and social engineering tactics will reduce the likelihood of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T16:46:14.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e54b7ef31ef0b59e5bd

Added to database: 2/25/2026, 9:49:08 PM

Last enriched: 2/26/2026, 1:27:38 AM

Last updated: 2/26/2026, 6:55:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats