Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13758: CWE-352 Cross-Site Request Forgery (CSRF) in codepeople CP Contact Form with PayPal

0
Medium
VulnerabilityCVE-2024-13758cvecve-2024-13758cwe-352
Published: Thu Jan 30 2025 (01/30/2025, 08:21:26 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: CP Contact Form with PayPal

Description

CVE-2024-13758 is a Cross-Site Request Forgery (CSRF) vulnerability in the CP Contact Form with PayPal WordPress plugin versions up to 1. 3. 52. The flaw arises from missing or incorrect nonce validation in the cp_contact_form_paypal_check_init_actions() function, allowing unauthenticated attackers to add discount codes by tricking a site administrator into clicking a malicious link. Exploitation requires user interaction but no authentication, and it impacts the integrity of the affected site by enabling unauthorized modifications. The vulnerability has a CVSS 3. 1 score of 6. 5 (medium severity). No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or implementing nonce validation to prevent unauthorized discount code additions.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:13:27 UTC

Technical Analysis

CVE-2024-13758 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the CP Contact Form with PayPal plugin for WordPress, specifically all versions up to and including 1.3.52. The vulnerability stems from missing or incorrect nonce validation in the cp_contact_form_paypal_check_init_actions() function, which is responsible for processing certain actions related to PayPal discount codes. Nonces are security tokens used to verify that requests originate from legitimate users and not from forged sources. Because this validation is absent or improperly implemented, an attacker can craft a malicious link or webpage that, when visited by a site administrator, triggers unauthorized actions such as adding discount codes without the administrator's consent. This attack vector requires no authentication but does require user interaction (clicking a link). The impact affects the integrity of the site by allowing unauthorized modifications to discount codes, potentially leading to financial loss or abuse of promotional offers. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly by site administrators and developers.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the CP Contact Form with PayPal plugin. Attackers can add unauthorized discount codes, potentially leading to financial losses through fraudulent discounts or abuse of promotional campaigns. This can undermine customer trust and damage the reputation of affected businesses. Since the attack requires tricking an administrator into clicking a malicious link, social engineering is a key component, increasing the risk in environments where administrators may be targeted via phishing. The vulnerability does not affect confidentiality or availability directly but can indirectly cause operational disruptions if financial discrepancies arise or if the site’s promotional mechanisms are compromised. Organizations relying on this plugin for payment processing or discount management are at risk, especially e-commerce sites and businesses with active promotional campaigns. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once the vulnerability becomes widely known.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the CP Contact Form with PayPal plugin to a version that includes proper nonce validation once available. Until an official patch is released, site administrators can implement manual nonce checks in the cp_contact_form_paypal_check_init_actions() function to ensure requests are legitimate. Additionally, administrators should be trained to avoid clicking on suspicious links and to verify the authenticity of requests related to administrative actions. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin can provide temporary protection. Regularly monitoring logs for unusual discount code additions or administrative actions can help detect exploitation attempts early. Restricting administrative access to trusted networks and using multi-factor authentication can reduce the risk of successful social engineering. Finally, developers should review other plugin functions for similar nonce validation issues to prevent related vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-28T00:13:26.157Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6db7ef31ef0b5a06ca

Added to database: 2/25/2026, 9:49:33 PM

Last enriched: 2/25/2026, 10:13:27 PM

Last updated: 2/26/2026, 7:38:16 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats