Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29093: Cross-Site Request Forgery (CSRF) in Saleswonder Team: Tobias Builder for WooCommerce reviews shortcodes – ReviewShort

0
Unknown
VulnerabilityCVE-2024-29093cvecve-2024-29093
Published: Tue Mar 19 2024 (03/19/2024, 16:40:14 UTC)
Source: CVE Database V5
Vendor/Project: Saleswonder Team: Tobias
Product: Builder for WooCommerce reviews shortcodes – ReviewShort

Description

Cross-Site Request Forgery (CSRF) vulnerability in Saleswonder Team: Tobias Builder for WooCommerce reviews shortcodes – ReviewShort woo-product-reviews-shortcode.This issue affects Builder for WooCommerce reviews shortcodes – ReviewShort: from n/a through <= 1.01.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:24:40 UTC

Technical Analysis

CVE-2024-29093 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Saleswonder Team's Tobias Builder for WooCommerce reviews shortcodes – ReviewShort plugin, specifically affecting versions up to 1.01.3. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing unintended actions. In this case, the vulnerability exists in the handling of WooCommerce review shortcodes, which are used to display product reviews on e-commerce sites. The plugin fails to implement adequate CSRF protections, such as nonce verification or token validation, allowing attackers to craft malicious requests that an authenticated administrator or user might unknowingly execute. This can lead to unauthorized modifications of review content or shortcode configurations, potentially damaging the integrity of product reviews and misleading customers. Although no exploits have been reported in the wild, the vulnerability is publicly disclosed and could be targeted by attackers. The plugin is widely used in WooCommerce-based stores, which are prevalent globally, increasing the exposure risk. The absence of a CVSS score requires an independent severity assessment based on the vulnerability's characteristics, including the requirement for user authentication and the limited but impactful scope of unauthorized actions.

Potential Impact

The primary impact of this CSRF vulnerability is the potential unauthorized modification of WooCommerce product reviews or shortcode configurations by attackers exploiting authenticated users' sessions. This can undermine the integrity and trustworthiness of product reviews, which are critical for customer decision-making in e-commerce. Altered or malicious reviews can damage brand reputation, reduce customer confidence, and ultimately affect sales revenue. Additionally, if attackers manipulate shortcode settings, they could disrupt the display or functionality of reviews, degrading user experience. While the vulnerability does not directly compromise sensitive user data or system availability, the reputational and operational impacts on affected e-commerce sites can be significant. Organizations relying on this plugin without mitigation are at risk of targeted attacks, especially those with high traffic or valuable product lines. The lack of known exploits suggests a window of opportunity for proactive defense before widespread abuse occurs.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for an official patch or update from the Saleswonder Team and apply it promptly once available. Until a patch is released, administrators should consider disabling the affected plugin or its review shortcode features to prevent exploitation. Implementing additional CSRF protections at the application level, such as enforcing nonce tokens or validating the origin and referrer headers for sensitive requests, can reduce risk. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts targeting the plugin's endpoints. Regularly auditing user privileges and limiting administrative access to trusted personnel minimizes the risk of session misuse. Educating users about the dangers of clicking untrusted links while authenticated can also help prevent CSRF attacks. Finally, maintaining comprehensive logging and monitoring for unusual review modifications or shortcode changes enables early detection of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-03-15T10:51:21.287Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7419e6bfc5ba1def52ef

Added to database: 4/1/2026, 7:38:01 PM

Last enriched: 4/2/2026, 4:24:40 AM

Last updated: 4/6/2026, 9:27:47 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses