Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13522: CWE-352 Cross-Site Request Forgery (CSRF) in magayo magayo Lottery Results

0
Medium
VulnerabilityCVE-2024-13522cvecve-2024-13522cwe-352
Published: Tue Feb 18 2025 (02/18/2025, 04:21:09 UTC)
Source: CVE Database V5
Vendor/Project: magayo
Product: magayo Lottery Results

Description

CVE-2024-13522 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the magayo Lottery Results WordPress plugin up to version 2. 0. 12. The flaw arises from missing or incorrect nonce validation on the plugin's settings page, allowing unauthenticated attackers to trick site administrators into performing unwanted actions. Exploitation can lead to unauthorized updates to plugin settings and injection of malicious scripts. The vulnerability requires user interaction, specifically an administrator clicking a crafted link. It has a CVSS 3. 1 score of 6. 1, indicating medium severity with potential impacts on confidentiality and integrity but no direct availability impact. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:16:07 UTC

Technical Analysis

CVE-2024-13522 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the magayo Lottery Results plugin for WordPress, affecting all versions up to and including 2.0.12. The vulnerability stems from missing or incorrect nonce validation on the 'magayo-lottery-results' admin page, which is intended to protect against unauthorized requests. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and prevent CSRF attacks. Due to this flaw, an unauthenticated attacker can craft a malicious request that, when executed by a logged-in administrator (typically by clicking a link or visiting a malicious page), causes the plugin settings to be updated or malicious web scripts to be injected. This can lead to unauthorized changes in plugin behavior and potential persistent cross-site scripting (XSS) if scripts are injected. The attack requires user interaction but no prior authentication, making it a significant risk especially for sites with administrators who might be targeted via phishing or social engineering. The CVSS 3.1 base score of 6.1 reflects a medium severity, with attack vector being network, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. The vulnerability impacts confidentiality and integrity but not availability. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. However, the widespread use of WordPress and this plugin in lottery or gambling-related websites increases the potential attack surface.

Potential Impact

The primary impact of CVE-2024-13522 is unauthorized modification of plugin settings and potential injection of malicious scripts, which can compromise the confidentiality and integrity of affected WordPress sites. Attackers can manipulate lottery result displays or other plugin functionalities, potentially misleading users or redirecting them to malicious content. This can damage the reputation of organizations, lead to data leakage, or facilitate further attacks such as session hijacking or malware distribution. Since the vulnerability requires an administrator to be tricked into clicking a link, social engineering is a key risk factor. Organizations running lottery, gambling, or related websites using this plugin are at higher risk, as attackers may target them to disrupt services or defraud users. While availability is not directly impacted, the indirect consequences of injected malicious scripts can lead to site defacement or blacklisting by search engines. The vulnerability affects all sites using the plugin up to version 2.0.12, which could be numerous given WordPress's global market share. Without mitigation, attackers could exploit this vulnerability to gain persistent footholds or manipulate site content.

Mitigation Recommendations

To mitigate CVE-2024-13522, organizations should immediately update the magayo Lottery Results plugin to a version that includes proper nonce validation once available. Until a patch is released, administrators should restrict access to the plugin's settings page to trusted personnel only and avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress admin. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin's endpoints can provide additional protection. Site owners should enable multi-factor authentication (MFA) for administrator accounts to reduce the risk of account compromise. Regularly auditing installed plugins for updates and vulnerabilities is critical. Additionally, administrators should review plugin settings for unauthorized changes and monitor site logs for unusual activity. Educating administrators about phishing and social engineering risks can reduce the likelihood of successful exploitation. If possible, temporarily disabling the plugin until a secure version is available can eliminate the attack vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-17T19:27:32.547Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5cb7ef31ef0b59ef3e

Added to database: 2/25/2026, 9:49:16 PM

Last enriched: 2/26/2026, 12:16:07 AM

Last updated: 2/26/2026, 8:53:49 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats