Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3643: CWE-352 Cross-Site Request Forgery (CSRF) in Newsletter Popup

0
High
VulnerabilityCVE-2024-3643cvecve-2024-3643cwe-352
Published: Thu May 16 2024 (05/16/2024, 06:00:02 UTC)
Source: CVE Database V5
Product: Newsletter Popup

Description

The Newsletter Popup WordPress plugin through 1.2 does not have CSRF check when deleting list, which could allow attackers to make logged in admins perform such action via a CSRF attack

AI-Powered Analysis

AILast updated: 01/09/2026, 21:09:50 UTC

Technical Analysis

CVE-2024-3643 is a vulnerability classified under CWE-352 (Cross-Site Request Forgery) found in the Newsletter Popup WordPress plugin up to version 1.2. The issue arises because the plugin does not implement any CSRF protection mechanism when administrators attempt to delete mailing lists. CSRF attacks exploit the trust a web application has in a logged-in user by tricking them into submitting unwanted actions via crafted requests, often through malicious websites or emails. In this case, an attacker can craft a request that, when visited by an authenticated admin, causes the deletion of mailing lists without their explicit consent. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, no privileges required to initiate the attack (though victim must be an admin), and user interaction required. The impact affects confidentiality, integrity, and availability, as mailing lists may contain sensitive subscriber data and are critical for communication workflows. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, especially in SMBs and marketing-focused organizations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and reliability of their customer communication channels. Mailing lists often contain personal data protected under GDPR, so unauthorized deletion could lead to data loss and regulatory compliance issues. The loss of mailing lists disrupts marketing campaigns, customer engagement, and potentially revenue streams. Since the attack requires an authenticated admin user to be tricked into clicking a malicious link, social engineering risks increase. The absence of CSRF protection means that even low-skilled attackers can exploit this vulnerability remotely. Organizations relying on the Newsletter Popup plugin for subscriber management are particularly vulnerable. The impact extends beyond data loss to potential reputational damage and operational downtime. Given the high WordPress market share in Europe, especially in countries with strong digital economies, the threat is relevant and urgent.

Mitigation Recommendations

Immediate mitigation steps include restricting administrative access to trusted personnel and enforcing multi-factor authentication to reduce the risk of compromised admin accounts. Administrators should avoid clicking on untrusted links or visiting suspicious websites while logged into WordPress. Since no official patch is currently available, organizations can implement manual CSRF protections by adding nonce verification or CSRF tokens to the delete list functionality in the plugin code if feasible. Monitoring and logging admin actions related to mailing list management can help detect suspicious activity. Regular backups of mailing lists and WordPress site data are critical to enable recovery in case of successful exploitation. Organizations should subscribe to security advisories from the plugin developer and WPScan for updates and apply patches promptly once released. Additionally, consider using alternative plugins with robust security practices if the vendor does not provide timely fixes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2024-04-10T20:58:41.292Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69616b4445ea0302aa763b37

Added to database: 1/9/2026, 8:55:32 PM

Last enriched: 1/9/2026, 9:09:50 PM

Last updated: 1/10/2026, 6:53:02 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats