CVE-2024-13758: CWE-352 Cross-Site Request Forgery (CSRF) in codepeople CP Contact Form with PayPal
CVE-2024-13758 is a Cross-Site Request Forgery (CSRF) vulnerability in the CP Contact Form with PayPal WordPress plugin versions up to 1. 3. 52. The flaw arises from missing or incorrect nonce validation in the cp_contact_form_paypal_check_init_actions() function, allowing unauthenticated attackers to add discount codes by tricking a site administrator into clicking a malicious link. Exploitation requires user interaction but no authentication, and it impacts the integrity of the affected site by enabling unauthorized modifications. The vulnerability has a CVSS 3. 1 score of 6. 5 (medium severity). No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or implementing nonce validation to prevent unauthorized discount code additions.
AI Analysis
Technical Summary
CVE-2024-13758 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the CP Contact Form with PayPal plugin for WordPress, specifically all versions up to and including 1.3.52. The vulnerability stems from missing or incorrect nonce validation in the cp_contact_form_paypal_check_init_actions() function, which is responsible for processing certain actions related to PayPal discount codes. Nonces are security tokens used to verify that requests originate from legitimate users and not from forged sources. Because this validation is absent or improperly implemented, an attacker can craft a malicious link or webpage that, when visited by a site administrator, triggers unauthorized actions such as adding discount codes without the administrator's consent. This attack vector requires no authentication but does require user interaction (clicking a link). The impact affects the integrity of the site by allowing unauthorized modifications to discount codes, potentially leading to financial loss or abuse of promotional offers. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly by site administrators and developers.
Potential Impact
The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the CP Contact Form with PayPal plugin. Attackers can add unauthorized discount codes, potentially leading to financial losses through fraudulent discounts or abuse of promotional campaigns. This can undermine customer trust and damage the reputation of affected businesses. Since the attack requires tricking an administrator into clicking a malicious link, social engineering is a key component, increasing the risk in environments where administrators may be targeted via phishing. The vulnerability does not affect confidentiality or availability directly but can indirectly cause operational disruptions if financial discrepancies arise or if the site’s promotional mechanisms are compromised. Organizations relying on this plugin for payment processing or discount management are at risk, especially e-commerce sites and businesses with active promotional campaigns. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the CP Contact Form with PayPal plugin to a version that includes proper nonce validation once available. Until an official patch is released, site administrators can implement manual nonce checks in the cp_contact_form_paypal_check_init_actions() function to ensure requests are legitimate. Additionally, administrators should be trained to avoid clicking on suspicious links and to verify the authenticity of requests related to administrative actions. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin can provide temporary protection. Regularly monitoring logs for unusual discount code additions or administrative actions can help detect exploitation attempts early. Restricting administrative access to trusted networks and using multi-factor authentication can reduce the risk of successful social engineering. Finally, developers should review other plugin functions for similar nonce validation issues to prevent related vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13758: CWE-352 Cross-Site Request Forgery (CSRF) in codepeople CP Contact Form with PayPal
Description
CVE-2024-13758 is a Cross-Site Request Forgery (CSRF) vulnerability in the CP Contact Form with PayPal WordPress plugin versions up to 1. 3. 52. The flaw arises from missing or incorrect nonce validation in the cp_contact_form_paypal_check_init_actions() function, allowing unauthenticated attackers to add discount codes by tricking a site administrator into clicking a malicious link. Exploitation requires user interaction but no authentication, and it impacts the integrity of the affected site by enabling unauthorized modifications. The vulnerability has a CVSS 3. 1 score of 6. 5 (medium severity). No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or implementing nonce validation to prevent unauthorized discount code additions.
AI-Powered Analysis
Technical Analysis
CVE-2024-13758 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the CP Contact Form with PayPal plugin for WordPress, specifically all versions up to and including 1.3.52. The vulnerability stems from missing or incorrect nonce validation in the cp_contact_form_paypal_check_init_actions() function, which is responsible for processing certain actions related to PayPal discount codes. Nonces are security tokens used to verify that requests originate from legitimate users and not from forged sources. Because this validation is absent or improperly implemented, an attacker can craft a malicious link or webpage that, when visited by a site administrator, triggers unauthorized actions such as adding discount codes without the administrator's consent. This attack vector requires no authentication but does require user interaction (clicking a link). The impact affects the integrity of the site by allowing unauthorized modifications to discount codes, potentially leading to financial loss or abuse of promotional offers. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly by site administrators and developers.
Potential Impact
The primary impact of this vulnerability is on the integrity of the affected WordPress sites using the CP Contact Form with PayPal plugin. Attackers can add unauthorized discount codes, potentially leading to financial losses through fraudulent discounts or abuse of promotional campaigns. This can undermine customer trust and damage the reputation of affected businesses. Since the attack requires tricking an administrator into clicking a malicious link, social engineering is a key component, increasing the risk in environments where administrators may be targeted via phishing. The vulnerability does not affect confidentiality or availability directly but can indirectly cause operational disruptions if financial discrepancies arise or if the site’s promotional mechanisms are compromised. Organizations relying on this plugin for payment processing or discount management are at risk, especially e-commerce sites and businesses with active promotional campaigns. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the CP Contact Form with PayPal plugin to a version that includes proper nonce validation once available. Until an official patch is released, site administrators can implement manual nonce checks in the cp_contact_form_paypal_check_init_actions() function to ensure requests are legitimate. Additionally, administrators should be trained to avoid clicking on suspicious links and to verify the authenticity of requests related to administrative actions. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin can provide temporary protection. Regularly monitoring logs for unusual discount code additions or administrative actions can help detect exploitation attempts early. Restricting administrative access to trusted networks and using multi-factor authentication can reduce the risk of successful social engineering. Finally, developers should review other plugin functions for similar nonce validation issues to prevent related vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-28T00:13:26.157Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6db7ef31ef0b5a06ca
Added to database: 2/25/2026, 9:49:33 PM
Last enriched: 2/25/2026, 10:13:27 PM
Last updated: 2/26/2026, 7:38:16 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.