Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39623: Cross-Site Request Forgery (CSRF) in CridioStudio ListingPro

0
Unknown
VulnerabilityCVE-2024-39623cvecve-2024-39623
Published: Thu Jan 02 2025 (01/02/2025, 12:56:23 UTC)
Source: CVE Database V5
Vendor/Project: CridioStudio
Product: ListingPro

Description

Cross-Site Request Forgery (CSRF) vulnerability in CridioStudio ListingPro listingpro allows Authentication Bypass.This issue affects ListingPro: from n/a through <= 2.9.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:23:38 UTC

Technical Analysis

CVE-2024-39623 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the ListingPro plugin developed by CridioStudio, affecting all versions up to 2.9.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the server trusts due to the user's active session. In this case, the vulnerability enables authentication bypass, meaning an attacker can perform privileged actions without proper authorization by exploiting the victim's authenticated session. ListingPro is a popular WordPress plugin used for creating directory and listing websites, often with administrative interfaces that manage sensitive data. The vulnerability likely stems from insufficient or missing anti-CSRF tokens or improper validation of request origins. Since no patches or exploit samples are currently available, the vulnerability remains unmitigated in affected versions. The attack vector requires the victim to be logged into the ListingPro site and visit a malicious site or click a crafted link, which then triggers unauthorized actions on the ListingPro installation. This can lead to unauthorized changes, data manipulation, or privilege escalation within the affected site. The lack of a CVSS score means severity must be inferred from the nature of the vulnerability, which impacts confidentiality, integrity, and potentially availability if administrative controls are bypassed. The vulnerability is particularly concerning for organizations relying on ListingPro for critical directory services or business listings, as it undermines trust and security of the platform.

Potential Impact

The primary impact of CVE-2024-39623 is unauthorized administrative actions due to authentication bypass via CSRF. This can lead to unauthorized data modification, deletion, or creation of listings, potentially damaging business reputation and user trust. Attackers could manipulate listings to inject malicious content, redirect users, or disrupt services. Confidential information stored in listings or user profiles could be exposed or altered, leading to privacy violations. The integrity of the website’s data is compromised, which could affect business operations relying on accurate directory information. If attackers gain administrative control, they could further escalate privileges or implant persistent backdoors, increasing long-term risk. The vulnerability affects all organizations using vulnerable ListingPro versions, especially those with high traffic or sensitive data. The ease of exploitation—requiring only that a logged-in user visits a malicious page—raises the likelihood of successful attacks. Although no exploits are known in the wild yet, the potential impact on availability, integrity, and confidentiality is significant, warranting urgent mitigation.

Mitigation Recommendations

1. Immediately update ListingPro to the latest version once a patch addressing CVE-2024-39623 is released by CridioStudio. 2. Until a patch is available, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting ListingPro endpoints. 3. Enforce strict SameSite cookie attributes (preferably 'Strict') to reduce CSRF risks by limiting cookie transmission on cross-site requests. 4. Review and harden user roles and permissions within WordPress to minimize the number of users with administrative privileges. 5. Educate users, especially administrators, to avoid clicking on suspicious links or visiting untrusted websites while logged into the ListingPro site. 6. Implement additional CSRF tokens or nonce validation in custom integrations or overrides if possible. 7. Monitor web server and application logs for unusual POST requests or unauthorized changes to listings. 8. Consider temporarily disabling or restricting access to ListingPro administrative functions from untrusted networks until the vulnerability is patched. 9. Conduct regular security audits and penetration tests focusing on CSRF and authentication bypass vectors in the WordPress environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-06-26T21:17:39.688Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7467e6bfc5ba1def7126

Added to database: 4/1/2026, 7:39:19 PM

Last enriched: 4/2/2026, 5:23:38 AM

Last updated: 4/6/2026, 9:31:16 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses