Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51632: Cross-Site Request Forgery (CSRF) in Sam Hoe SH Slideshow

0
Unknown
VulnerabilityCVE-2024-51632cvecve-2024-51632
Published: Tue Nov 19 2024 (11/19/2024, 16:32:30 UTC)
Source: CVE Database V5
Vendor/Project: Sam Hoe
Product: SH Slideshow

Description

Cross-Site Request Forgery (CSRF) vulnerability in Sam Hoe SH Slideshow sh-slideshow allows Stored XSS.This issue affects SH Slideshow: from n/a through <= 4.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:27:57 UTC

Technical Analysis

CVE-2024-51632 identifies a security vulnerability in the Sam Hoe SH Slideshow plugin, specifically a Cross-Site Request Forgery (CSRF) flaw that enables Stored Cross-Site Scripting (XSS) attacks. The affected versions include all releases up to and including version 4.3. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to the vulnerable application, leveraging the victim's credentials and session context. In this case, the CSRF flaw facilitates the injection of malicious scripts that are stored persistently within the application, which can then execute in the context of other users visiting the affected site. This stored XSS can lead to session hijacking, credential theft, defacement, or distribution of malware. The vulnerability arises from insufficient validation of user requests and lack of proper anti-CSRF tokens or mechanisms in the plugin's request handling. Although no public exploits have been reported, the combination of CSRF and stored XSS significantly raises the risk profile. The plugin is commonly used in WordPress environments to create slideshows, making websites using this plugin potential targets. The absence of an official CVSS score requires an expert severity assessment based on the vulnerability's characteristics. The vulnerability was published on November 19, 2024, with no patch links currently available, indicating that users must monitor for updates or apply manual mitigations.

Potential Impact

The impact of CVE-2024-51632 is substantial for organizations running websites with the SH Slideshow plugin. Successful exploitation can lead to persistent XSS attacks, enabling attackers to execute arbitrary JavaScript in the browsers of site visitors or administrators. This can result in session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed with elevated privileges, and potential malware distribution. The CSRF aspect means attackers can induce authenticated users to unknowingly perform malicious actions, increasing the risk of compromise without direct user interaction beyond visiting a crafted page. For organizations, this can lead to data breaches, reputational damage, loss of customer trust, and compliance violations. The vulnerability affects the integrity and confidentiality of data and can also impact availability if attackers deface or disrupt website functionality. Given the widespread use of WordPress and its plugins globally, the scope of affected systems is significant, especially for small to medium businesses relying on this plugin for website functionality.

Mitigation Recommendations

To mitigate CVE-2024-51632, organizations should first check for and apply any official patches or updates released by the Sam Hoe plugin developers as soon as they become available. In the absence of patches, administrators should consider disabling or removing the SH Slideshow plugin to eliminate exposure. Implementing Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns can provide interim protection. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of stored XSS by restricting script execution sources. Additionally, website administrators should ensure that user roles and permissions are tightly controlled, minimizing the number of users with privileges that could be exploited via CSRF. Regular security audits and scanning for XSS vulnerabilities on the site can help detect exploitation attempts early. Educating users about phishing and suspicious links can reduce the risk of CSRF exploitation. Finally, monitoring web server and application logs for unusual activity related to the plugin can aid in early detection of attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-30T15:04:59.527Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd750ce6bfc5ba1df02762

Added to database: 4/1/2026, 7:42:04 PM

Last enriched: 4/2/2026, 10:27:57 AM

Last updated: 4/3/2026, 11:43:54 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses