Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37435: Cross-Site Request Forgery (CSRF) in raratheme Perfect Portfolio

0
Unknown
VulnerabilityCVE-2024-37435cvecve-2024-37435
Published: Thu Jan 02 2025 (01/02/2025, 12:00:50 UTC)
Source: CVE Database V5
Vendor/Project: raratheme
Product: Perfect Portfolio

Description

Cross-Site Request Forgery (CSRF) vulnerability in raratheme Perfect Portfolio perfect-portfolio allows Cross Site Request Forgery.This issue affects Perfect Portfolio: from n/a through <= 1.2.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:06:57 UTC

Technical Analysis

CVE-2024-37435 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the raratheme Perfect Portfolio WordPress plugin, specifically affecting versions up to 1.2.0. CSRF vulnerabilities occur when a web application does not adequately verify that requests made to it originate from legitimate users, allowing attackers to craft malicious requests that execute unwanted actions on behalf of authenticated users. In this case, the Perfect Portfolio plugin lacks proper anti-CSRF tokens or verification mechanisms to validate the authenticity of state-changing requests. An attacker can exploit this by enticing a logged-in administrator or user with sufficient privileges to visit a malicious website, which then silently submits forged requests to the vulnerable site. These requests could modify plugin settings, alter portfolio content, or perform other administrative actions depending on the plugin’s capabilities and user privileges. The vulnerability does not require the attacker to have direct access or credentials but relies on the victim’s authenticated session. No CVSS score has been assigned yet, and no patches or official fixes are currently available, increasing the urgency for users to implement interim mitigations. While no exploits have been observed in the wild, the vulnerability’s nature and the widespread use of WordPress plugins make it a credible risk. The vulnerability was reserved in June 2024 and published in January 2025 by Patchstack, indicating responsible disclosure but a lack of immediate remediation.

Potential Impact

The impact of this CSRF vulnerability can be significant for organizations using the Perfect Portfolio plugin on their WordPress sites. Successful exploitation can lead to unauthorized changes to portfolio content, plugin configurations, or other administrative functions, potentially defacing websites, disrupting business operations, or exposing sensitive information. For organizations relying on their web presence for marketing, client engagement, or e-commerce, such unauthorized modifications can damage reputation and trust. Additionally, attackers could leverage this vulnerability as a foothold for further attacks, such as privilege escalation or injecting malicious code. Since the vulnerability requires the victim to be authenticated, the impact is primarily on sites with logged-in users who have sufficient privileges, such as administrators or editors. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly once vulnerabilities are public. The lack of an official patch means organizations must rely on alternative mitigations, increasing operational overhead and risk exposure.

Mitigation Recommendations

To mitigate CVE-2024-37435 effectively, organizations should first monitor for updates or patches from raratheme and apply them promptly once available. In the interim, implement web application firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the Perfect Portfolio plugin endpoints. Enforce strict user session management and limit the number of users with administrative privileges to reduce the attack surface. Employ security plugins that add CSRF protection layers or nonce verification to WordPress forms and actions. Educate users, especially administrators, to avoid clicking on suspicious links or visiting untrusted websites while logged into the WordPress admin panel. Regularly audit and monitor logs for unusual activity related to the plugin. Consider temporarily disabling or replacing the Perfect Portfolio plugin if the risk is unacceptable and no patch is available. Finally, adopt a defense-in-depth approach by ensuring WordPress core and all plugins are kept up to date and by implementing least privilege principles for user roles.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-06-09T08:51:46.248Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7457e6bfc5ba1def6d2f

Added to database: 4/1/2026, 7:39:03 PM

Last enriched: 4/2/2026, 5:06:57 AM

Last updated: 4/4/2026, 8:16:32 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses