Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51650: Cross-Site Request Forgery (CSRF) in scottmydollarplancom Random Featured Post

0
Unknown
VulnerabilityCVE-2024-51650cvecve-2024-51650
Published: Tue Nov 19 2024 (11/19/2024, 16:32:22 UTC)
Source: CVE Database V5
Vendor/Project: scottmydollarplancom
Product: Random Featured Post

Description

Cross-Site Request Forgery (CSRF) vulnerability in scottmydollarplancom Random Featured Post random-featured-post-plugin allows Stored XSS.This issue affects Random Featured Post: from n/a through <= 1.1.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:53:03 UTC

Technical Analysis

CVE-2024-51650 identifies a security vulnerability in the Random Featured Post plugin developed by scottmydollarplancom, specifically versions up to and including 1.1.3. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that enables attackers to trick authenticated users into executing unwanted actions on their behalf. This CSRF vulnerability is compounded by the presence of stored Cross-Site Scripting (XSS), meaning that malicious scripts can be injected and persist within the plugin's stored data. When an authenticated user visits a maliciously crafted page or link, the attacker can exploit the CSRF to submit unauthorized requests that result in stored XSS payloads being saved and later executed in the context of the victim’s browser. This can lead to session hijacking, defacement, data theft, or further malware distribution. The plugin is typically used in WordPress environments to display random featured posts, and the vulnerability arises from insufficient validation of requests and lack of proper anti-CSRF tokens. No official patches or fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on October 30, 2024, and published on November 19, 2024, by Patchstack. The absence of a CVSS score necessitates an independent severity assessment based on the nature of the vulnerability and its potential impact.

Potential Impact

The impact of CVE-2024-51650 is significant for organizations using the affected Random Featured Post plugin, especially those running WordPress sites with authenticated user sessions. Successful exploitation can lead to persistent stored XSS attacks, allowing attackers to execute arbitrary JavaScript in the context of site visitors or administrators. This can result in credential theft, session hijacking, unauthorized actions, defacement, or distribution of malware. The CSRF aspect means attackers can induce authenticated users to perform malicious actions unknowingly, increasing the attack surface. For organizations, this can lead to data breaches, loss of user trust, reputational damage, and potential regulatory penalties if sensitive data is compromised. Since WordPress powers a large portion of websites globally, the scope of affected systems could be broad, particularly for sites that have installed this plugin and not updated it. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk if weaponized.

Mitigation Recommendations

To mitigate CVE-2024-51650, organizations should immediately verify if their WordPress installations use the Random Featured Post plugin version 1.1.3 or earlier. If so, they should seek updates or patches from the plugin developer or consider disabling the plugin until a fix is available. Implementing Web Application Firewall (WAF) rules to detect and block CSRF and XSS attack patterns can provide temporary protection. Administrators should enforce strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Additionally, ensuring that all forms and state-changing requests include anti-CSRF tokens can prevent unauthorized requests. Regularly auditing plugins for security updates and minimizing the use of unnecessary plugins reduces attack surface. User education to avoid clicking suspicious links and monitoring logs for unusual activity related to the plugin can help detect exploitation attempts early. Finally, consider isolating or sandboxing plugin functionality where possible to limit the impact of any compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-30T15:05:17.627Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd750de6bfc5ba1df027d1

Added to database: 4/1/2026, 7:42:05 PM

Last enriched: 4/2/2026, 7:53:03 AM

Last updated: 4/6/2026, 9:28:05 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses