Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27195: CWE-352 Cross-Site Request Forgery (CSRF) in Sandi Verdev Watermark RELOADED

0
High
VulnerabilityCVE-2024-27195cvecve-2024-27195cwe-352
Published: Sat Mar 16 2024 (03/16/2024, 01:17:58 UTC)
Source: CVE Database V5
Vendor/Project: Sandi Verdev
Product: Watermark RELOADED

Description

Cross-Site Request Forgery (CSRF) vulnerability in Sandi Verdev Watermark RELOADED allows Stored XSS.This issue affects Watermark RELOADED: from n/a through 1.3.5.

AI-Powered Analysis

AILast updated: 12/08/2025, 16:04:24 UTC

Technical Analysis

CVE-2024-27195 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Sandi Verdev Watermark RELOADED plugin, a tool commonly used to add watermarks to images on WordPress websites. The vulnerability exists in versions up to 1.3.5 and allows attackers to trick authenticated users into executing unwanted actions without their consent. This CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist on the affected site and execute in the context of other users' browsers. The vulnerability requires no prior authentication (PR:N) but does require user interaction (UI:R), such as clicking a malicious link or visiting a crafted webpage. The attack vector is network-based (AV:N), meaning it can be exploited remotely over the internet. The vulnerability has a scope change (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L), as attackers can potentially steal session tokens, modify content, or disrupt service. No official patches have been released yet, and no known exploits are reported in the wild. However, the presence of stored XSS combined with CSRF significantly raises the risk profile, as it enables persistent attacks that can compromise user accounts and site integrity. The vulnerability is categorized under CWE-352, which highlights weaknesses in CSRF protections. Given the plugin’s usage in WordPress environments, the threat primarily targets websites relying on this plugin for watermarking images, which may include e-commerce, media, and content publishing sites.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, especially for those operating WordPress websites that utilize the Watermark RELOADED plugin. Exploitation could lead to unauthorized actions performed on behalf of legitimate users, including administrators, resulting in persistent XSS attacks that compromise user sessions, steal sensitive data, or deface websites. This can damage brand reputation, lead to data breaches involving personal data protected under GDPR, and disrupt business operations. The vulnerability’s ability to affect confidentiality, integrity, and availability means attackers could manipulate website content or inject malicious scripts that spread malware or conduct phishing attacks. Organizations in sectors such as e-commerce, media, and government services are particularly vulnerable due to their reliance on web presence and user trust. The lack of available patches increases the urgency for interim mitigations. Additionally, the cross-site nature of the attack could facilitate lateral movement within networks if administrative credentials are compromised. The potential regulatory and financial consequences of a breach stemming from this vulnerability are significant for European entities.

Mitigation Recommendations

1. Immediately audit the use of the Watermark RELOADED plugin across all WordPress installations and disable or remove it if not essential. 2. Monitor official vendor channels and security advisories for patches or updates addressing CVE-2024-27195 and apply them promptly once available. 3. Implement Web Application Firewall (WAF) rules to detect and block CSRF attack patterns and suspicious POST requests targeting the plugin’s endpoints. 4. Enforce strict Content Security Policy (CSP) headers to mitigate the impact of stored XSS by restricting script execution sources. 5. Harden WordPress installations by limiting administrative access, enforcing multi-factor authentication, and regularly reviewing user permissions to reduce the risk of privilege abuse. 6. Educate users and administrators about the risks of clicking unsolicited links or visiting untrusted websites to reduce the likelihood of successful CSRF exploitation. 7. Consider deploying security plugins that add CSRF tokens to forms and verify their presence on all state-changing requests. 8. Conduct regular security assessments and penetration testing focusing on CSRF and XSS vulnerabilities in web applications. 9. Maintain comprehensive logging and monitoring to detect anomalous activities indicative of exploitation attempts. 10. If immediate patching is not possible, isolate affected systems or restrict access to trusted IP ranges to limit exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-02-21T07:35:09.494Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6936f3803bff8e5109804488

Added to database: 12/8/2025, 3:49:20 PM

Last enriched: 12/8/2025, 4:04:24 PM

Last updated: 12/10/2025, 6:02:38 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats