Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54426: Cross-Site Request Forgery (CSRF) in crossfitatgg LeaderBoard Plugin

0
Unknown
VulnerabilityCVE-2024-54426cvecve-2024-54426
Published: Mon Dec 16 2024 (12/16/2024, 14:13:48 UTC)
Source: CVE Database V5
Vendor/Project: crossfitatgg
Product: LeaderBoard Plugin

Description

Cross-Site Request Forgery (CSRF) vulnerability in crossfitatgg LeaderBoard Plugin leaderboard-lite allows Stored XSS.This issue affects LeaderBoard Plugin: from n/a through <= 1.2.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:57:37 UTC

Technical Analysis

CVE-2024-54426 identifies a security vulnerability in the crossfitatgg LeaderBoard Plugin, specifically versions up to and including 1.2.4. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into submitting unauthorized requests to the web application. This CSRF vulnerability is compounded by the presence of Stored Cross-Site Scripting (XSS), which means that malicious scripts injected via the CSRF attack can be persistently stored within the plugin's data and executed in the context of users' browsers when they access affected pages. The combination of CSRF and Stored XSS significantly increases the attack surface, enabling attackers to hijack user sessions, steal sensitive information, manipulate leaderboard data, or perform administrative actions depending on the victim's privileges. The vulnerability affects the LeaderBoard Plugin, a WordPress plugin used to display and manage leaderboards, commonly in fitness or community websites. No official patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was published on December 16, 2024, with no CVSS score assigned yet. The lack of authentication bypass or complex exploitation steps suggests that an attacker only needs to lure a logged-in user to a malicious page to trigger the exploit. This vulnerability highlights the importance of proper CSRF protections and input sanitization in WordPress plugins.

Potential Impact

The impact of CVE-2024-54426 is significant for organizations using the crossfitatgg LeaderBoard Plugin. Successful exploitation can lead to unauthorized actions performed on behalf of legitimate users, including administrators, potentially resulting in data manipulation or defacement of leaderboard information. The Stored XSS component allows attackers to inject persistent malicious scripts, which can be used to steal session cookies, perform further attacks such as privilege escalation, or deliver malware to site visitors. This can compromise the confidentiality and integrity of user data and the availability of the affected web service. For organizations relying on this plugin for community engagement or fitness tracking, the reputational damage and loss of user trust could be severe. Additionally, if administrative accounts are compromised, attackers could gain broader control over the affected WordPress site, leading to further exploitation or pivoting within the network. Although no exploits are currently known in the wild, the ease of exploitation and the combination of CSRF with Stored XSS make this a high-risk vulnerability that should be addressed promptly.

Mitigation Recommendations

To mitigate CVE-2024-54426, organizations should first check for and apply any official patches or updates from the plugin vendor as they become available. In the absence of an official patch, administrators should implement strict CSRF protections by ensuring that all state-changing requests require a valid, unique CSRF token verified on the server side. Input validation and output encoding should be enforced rigorously to prevent Stored XSS, including sanitizing all user-supplied data before storage and display. Restricting plugin usage to trusted users and limiting administrative privileges can reduce the attack surface. Web Application Firewalls (WAFs) can be configured to detect and block suspicious CSRF and XSS attack patterns. Additionally, monitoring logs for unusual activity and educating users about phishing and social engineering risks can help prevent exploitation. Regular security audits of WordPress plugins and dependencies are recommended to identify and remediate vulnerabilities proactively. Finally, consider isolating or disabling the LeaderBoard Plugin temporarily if immediate patching is not feasible to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-12-02T12:06:31.385Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75a4e6bfc5ba1df06b79

Added to database: 4/1/2026, 7:44:36 PM

Last enriched: 4/2/2026, 4:57:37 AM

Last updated: 4/6/2026, 1:14:42 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses