Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9649: CWE-352 Cross-Site Request Forgery (CSRF) in alimir WP ULike – All-in-One Engagement Toolkit

0
Medium
VulnerabilityCVE-2024-9649cvecve-2024-9649cwe-352
Published: Wed Oct 16 2024 (10/16/2024, 02:05:04 UTC)
Source: CVE Database V5
Vendor/Project: alimir
Product: WP ULike – All-in-One Engagement Toolkit

Description

CVE-2024-9649 is a Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 4. 7. 4 of the WP ULike – All-in-One Engagement Toolkit WordPress plugin. The flaw arises from missing or incorrect nonce validation in the wp_ulike_delete_history_api() function, allowing unauthenticated attackers to trick site administrators into deleting engagement data via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts integrity by enabling unauthorized deletion of engagement history but does not affect confidentiality or availability. The CVSS score is 4. 3 (medium severity), reflecting the limited scope and required user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent potential manipulation of engagement data.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:32:31 UTC

Technical Analysis

CVE-2024-9649 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the WP ULike – All-in-One Engagement Toolkit plugin for WordPress, affecting all versions up to and including 4.7.4. The vulnerability stems from missing or incorrect nonce validation in the wp_ulike_delete_history_api() function, which is responsible for handling requests to delete user engagement history. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. The absence or improper implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a specially crafted link), results in the deletion of engagement data. This attack vector requires user interaction and targets the integrity of the engagement data stored by the plugin. The vulnerability does not grant access to confidential information nor does it cause denial of service, but it can disrupt the accuracy and completeness of engagement metrics. The CVSS 3.1 score of 4.3 reflects the network attack vector, low attack complexity, no privileges required, but user interaction is necessary. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly to prevent potential misuse.

Potential Impact

The primary impact of this vulnerability is the unauthorized deletion of engagement data within the WP ULike plugin, which can undermine the integrity of user interaction metrics on affected websites. For organizations relying on these metrics for marketing, user engagement analysis, or community management, this could lead to inaccurate reporting and decision-making. While the vulnerability does not expose sensitive data or cause service outages, the manipulation of engagement history could affect trustworthiness and operational insights. Attackers could exploit this flaw to sabotage competitor websites or disrupt community engagement on high-profile sites. Since exploitation requires an administrator to be tricked into clicking a malicious link, the risk is somewhat mitigated by user awareness but remains significant in environments with less stringent security training. The widespread use of WordPress globally, combined with the popularity of engagement plugins, means many websites could be affected, especially those with active administrative users who might be targeted via phishing or social engineering campaigns.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for updates from the plugin vendor and apply any patches or newer versions that address the nonce validation issue. If no patch is available, administrators can implement manual nonce verification in the wp_ulike_delete_history_api() function to ensure requests are legitimate. Additionally, enforcing strict Content Security Policy (CSP) headers can help reduce the risk of CSRF by limiting the domains from which scripts can be loaded. Administrators should also be trained to recognize phishing attempts and avoid clicking suspicious links, especially when logged into administrative accounts. Employing multi-factor authentication (MFA) for WordPress admin accounts can reduce the risk of account compromise. Finally, monitoring logs for unusual deletion requests and maintaining regular backups of engagement data will aid in quick recovery if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-08T18:52:57.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b56b7ef31ef0b55308b

Added to database: 2/25/2026, 9:36:22 PM

Last enriched: 2/25/2026, 11:32:31 PM

Last updated: 2/26/2026, 8:21:38 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats