Skip to main content

CVE-2024-6719: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Offload Videos

High
VulnerabilityCVE-2024-6719cvecve-2024-6719cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:07:09 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Offload Videos

Description

The Offload Videos WordPress plugin before 1.0.1 does not have CSRF check in place when updating its settings, which could allow low privilege users to update them via a CSRF attack

AI-Powered Analysis

AILast updated: 07/04/2025, 08:09:48 UTC

Technical Analysis

CVE-2024-6719 is a high-severity vulnerability affecting the Offload Videos WordPress plugin versions prior to 1.0.1. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352), where the plugin lacks proper CSRF protections when updating its settings. This absence of a CSRF token or equivalent verification mechanism allows an attacker to trick an authenticated user with low privileges into submitting unauthorized requests that change the plugin's configuration. The vulnerability is exploitable remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as the victim clicking a malicious link or visiting a crafted webpage. The impact of a successful exploit includes high integrity and availability damage, as attackers can alter plugin settings potentially disrupting video offloading functionality or causing denial of service. Confidentiality impact is not directly affected. Since the plugin operates within WordPress, a widely used CMS, the attack surface includes any site running vulnerable versions of this plugin. No known exploits are currently reported in the wild, but the CVSS score of 8.1 indicates a significant risk if exploited. The vulnerability was published on May 15, 2025, and no official patches or updates have been linked yet, emphasizing the need for immediate attention by site administrators. The plugin's market penetration is unknown, but WordPress's popularity in Europe suggests a non-negligible exposure. The vulnerability could be leveraged in targeted attacks or broad campaigns to disrupt web services relying on Offload Videos for media management.

Potential Impact

For European organizations, this vulnerability poses a considerable risk especially for businesses and institutions relying on WordPress sites with the Offload Videos plugin installed. Successful exploitation can lead to unauthorized changes in plugin settings, potentially causing service disruptions or degraded user experience by interfering with video delivery. This can affect e-commerce platforms, media companies, educational institutions, and government websites that use video content. The integrity and availability impacts could translate into operational downtime, loss of customer trust, and reputational damage. Additionally, attackers might use this vulnerability as a foothold to conduct further attacks or pivot within the network. Given the high CVSS score and the ease of exploitation without privileges, European organizations should prioritize identifying affected systems and mitigating the risk promptly. The lack of known exploits in the wild currently provides a window for proactive defense.

Mitigation Recommendations

1. Immediate identification of WordPress sites using the Offload Videos plugin is critical. Site administrators should audit their plugins and verify the version installed. 2. Upgrade the Offload Videos plugin to version 1.0.1 or later as soon as it becomes available, as this version addresses the CSRF vulnerability. 3. If an official patch is not yet available, implement temporary mitigations such as restricting access to the WordPress admin interface via IP whitelisting or VPN to reduce exposure. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious CSRF attack patterns targeting plugin settings endpoints. 5. Educate users with administrative or editor roles about the risks of clicking untrusted links while logged into WordPress dashboards. 6. Monitor logs for unusual POST requests to the plugin’s settings URLs that could indicate exploitation attempts. 7. Consider disabling or removing the plugin if it is not essential until a secure version is deployed. 8. Regularly back up WordPress configurations and databases to enable quick recovery if settings are maliciously altered.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-07-12T19:51:37.943Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec276

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 8:09:48 AM

Last updated: 8/18/2025, 11:34:15 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats