Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51634: Cross-Site Request Forgery (CSRF) in a.ankit Webriti Custom Login

0
Unknown
VulnerabilityCVE-2024-51634cvecve-2024-51634
Published: Tue Nov 19 2024 (11/19/2024, 16:32:29 UTC)
Source: CVE Database V5
Vendor/Project: a.ankit
Product: Webriti Custom Login

Description

Cross-Site Request Forgery (CSRF) vulnerability in a.ankit Webriti Custom Login webriti-custom-login-page allows Reflected XSS.This issue affects Webriti Custom Login: from n/a through <= 0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:27:37 UTC

Technical Analysis

CVE-2024-51634 identifies a security vulnerability in the Webriti Custom Login plugin developed by a.ankit, specifically affecting versions up to and including 0.3. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into submitting unwanted requests to the web application, potentially changing user settings or performing actions without their consent. Additionally, the vulnerability enables reflected Cross-Site Scripting (XSS), where malicious scripts can be injected and executed in the context of the victim's browser session. The combination of CSRF and reflected XSS increases the attack surface, as attackers can leverage the XSS to bypass same-origin policies and craft more effective CSRF attacks. The plugin is typically used to customize login pages on WordPress sites, making it a target for attackers aiming to compromise user accounts or site integrity. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability was published on November 19, 2024, and was reserved on October 30, 2024, by Patchstack. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps. Given the plugin's role in authentication workflows, exploitation could lead to unauthorized access, session hijacking, or defacement through script injection.

Potential Impact

The impact of CVE-2024-51634 is significant for organizations using the Webriti Custom Login plugin. Successful exploitation can compromise user accounts by performing unauthorized actions via CSRF, potentially leading to privilege escalation or account takeover. The reflected XSS component allows attackers to execute arbitrary JavaScript in users' browsers, which can be used to steal session cookies, redirect users to malicious sites, or deliver malware. This dual vulnerability threatens the confidentiality of user data, the integrity of the website's authentication process, and the availability of services if attackers disrupt login functionality or deface the site. Organizations relying on this plugin for login customization face risks of reputational damage, regulatory non-compliance due to data breaches, and operational disruptions. Since no known exploits exist yet, attackers may attempt to develop them rapidly, increasing urgency for mitigation. The vulnerability's presence in a widely used CMS plugin amplifies its potential reach, affecting numerous websites globally.

Mitigation Recommendations

To mitigate CVE-2024-51634, organizations should first check for any official patches or updates from the plugin developer and apply them immediately once available. In the absence of a patch, administrators should consider disabling or removing the Webriti Custom Login plugin to eliminate exposure. Implementing Web Application Firewall (WAF) rules that detect and block CSRF and reflected XSS attack patterns can provide interim protection. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of reflected XSS by restricting script execution sources. Additionally, enabling anti-CSRF tokens in forms and validating the Origin and Referer headers on the server side can reduce CSRF risks. Regularly auditing and monitoring web server logs for suspicious requests related to login pages can help detect exploitation attempts early. Educating users about phishing and social engineering risks associated with CSRF attacks is also beneficial. Finally, organizations should consider alternative, well-maintained login customization plugins with strong security track records.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-30T15:04:59.528Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd750ce6bfc5ba1df02768

Added to database: 4/1/2026, 7:42:04 PM

Last enriched: 4/2/2026, 10:27:37 AM

Last updated: 4/6/2026, 1:15:05 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses