Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13684: CWE-352 Cross-Site Request Forgery (CSRF) in shubhamgrover7256 Reset

0
High
VulnerabilityCVE-2024-13684cvecve-2024-13684cwe-352
Published: Tue Feb 18 2025 (02/18/2025, 04:21:12 UTC)
Source: CVE Database V5
Vendor/Project: shubhamgrover7256
Product: Reset

Description

CVE-2024-13684 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the Reset WordPress plugin up to version 1. 6. The vulnerability arises from missing or incorrect nonce validation in the reset_db_page() function, allowing unauthenticated attackers to trick site administrators into executing malicious reset actions via forged requests. Exploitation can lead to resetting critical database tables such as comments, themes, and plugins, causing significant integrity and availability impacts. No known exploits are currently reported in the wild. The vulnerability requires user interaction (administrator clicking a crafted link) but no authentication by the attacker. Organizations using this plugin should urgently apply patches or implement mitigations to prevent unauthorized database resets. Countries with large WordPress user bases and significant web hosting industries are most at risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:41:57 UTC

Technical Analysis

CVE-2024-13684 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Reset plugin for WordPress, affecting all versions up to and including 1.6. The root cause is the absence or improper implementation of nonce validation in the reset_db_page() function, which is responsible for resetting various database tables. Nonces are security tokens used to verify that requests originate from legitimate users and not from forged sources. Without proper nonce checks, an attacker can craft a malicious URL or request that, when visited or triggered by a site administrator, causes the plugin to reset critical database tables such as comments, themes, and plugins. This can lead to loss of data integrity and availability, severely disrupting website functionality. The vulnerability does not require the attacker to be authenticated but does require that an administrator user interacts with the malicious request, typically by clicking a link. The CVSS v3.1 base score is 8.1, reflecting high severity due to the ease of exploitation (network vector, low complexity), no privileges required, but requiring user interaction. While no exploits have been reported in the wild yet, the potential impact on WordPress sites using this plugin is significant. The vulnerability was publicly disclosed in February 2025, with no official patch links available at the time of this report.

Potential Impact

The impact of CVE-2024-13684 is substantial for organizations running WordPress sites with the Reset plugin installed. Successful exploitation can result in unauthorized resetting of database tables, leading to the loss of comments, themes, plugins, and potentially other critical data. This compromises data integrity and availability, causing website downtime, loss of user-generated content, and disruption of site functionality. For businesses relying on WordPress for e-commerce, content delivery, or customer engagement, such disruptions can lead to revenue loss, reputational damage, and increased recovery costs. Since the attack requires tricking an administrator into clicking a malicious link, targeted phishing campaigns could be used to exploit this vulnerability. The lack of authentication requirement for the attacker broadens the threat landscape, making any site with this plugin a potential target. Although no known exploits are currently active, the high CVSS score and ease of exploitation make this a critical risk that should be addressed promptly.

Mitigation Recommendations

To mitigate CVE-2024-13684, organizations should take the following specific actions: 1) Immediately check for and apply any official patches or updates released by the Reset plugin developer. If no patch is available, consider temporarily disabling or uninstalling the plugin until a fix is released. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the reset_db_page() endpoint, especially those lacking valid nonce tokens. 3) Educate site administrators about the risks of clicking unsolicited links and encourage the use of secure browsing practices to reduce the risk of social engineering attacks. 4) Restrict administrative access to trusted IP addresses or VPNs where possible to limit exposure. 5) Regularly back up WordPress databases and files to enable rapid recovery in case of exploitation. 6) Monitor web server and application logs for unusual requests or patterns that may indicate attempted exploitation. 7) Consider adding additional nonce validation or custom security checks if modifying the plugin code is feasible. These steps go beyond generic advice by focusing on immediate containment, administrator awareness, and layered defenses tailored to the nature of this CSRF vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T18:48:45.010Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e67b7ef31ef0b5a00b9

Added to database: 2/25/2026, 9:49:27 PM

Last enriched: 2/25/2026, 10:41:57 PM

Last updated: 2/26/2026, 6:18:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats