Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24549: CWE-352 Cross-Site Request Forgery (CSRF) in Paolo GeoDirectory

0
Medium
VulnerabilityCVE-2026-24549cvecve-2026-24549cwe-352
Published: Fri Jan 23 2026 (01/23/2026, 14:28:52 UTC)
Source: CVE Database V5
Vendor/Project: Paolo
Product: GeoDirectory

Description

Cross-Site Request Forgery (CSRF) vulnerability in Paolo GeoDirectory allows Cross Site Request Forgery.This issue affects GeoDirectory: from n/a before 2.8.150.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:26:50 UTC

Technical Analysis

CVE-2026-24549 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Paolo GeoDirectory plugin, affecting versions prior to 2.8.150. CSRF vulnerabilities occur when a web application does not properly verify that requests modifying state originate from legitimate users, allowing attackers to craft malicious web pages that cause authenticated users to unknowingly execute unwanted actions. In this case, the vulnerability allows an attacker to induce users of GeoDirectory to perform state-changing operations without their consent, potentially altering directory listings, configurations, or other sensitive data managed by the plugin. The CVSS v3.1 base score of 4.3 reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vendor action. The vulnerability is classified under CWE-352, a common web application security weakness related to insufficient anti-CSRF protections such as missing or ineffective CSRF tokens or validation mechanisms. GeoDirectory is often used in local business directories, tourism, and location-based services, making the integrity of its data critical for affected organizations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized modifications of directory data, such as business listings or location information, potentially damaging trust and operational accuracy. Attackers might exploit this to insert fraudulent data, disrupt services, or manipulate user-facing content. Although the confidentiality and availability impacts are minimal, the integrity compromise could affect decision-making, customer experience, and regulatory compliance, especially in sectors relying on accurate geographic data. Organizations in tourism, local government, and commerce sectors using GeoDirectory are particularly at risk. The medium severity score suggests moderate urgency; however, the absence of known exploits reduces immediate risk. Still, the widespread use of web applications in Europe and the importance of data integrity in the region's digital economy mean that even medium-severity vulnerabilities warrant prompt attention.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor Paolo's official channels for patches or updates addressing CVE-2026-24549 and apply them promptly once available. In the interim, administrators can implement manual CSRF protections by ensuring that all state-changing requests require valid, unique CSRF tokens verified on the server side. Additionally, enforcing strict referer and origin header checks can help detect and block unauthorized cross-origin requests. Web application firewalls (WAFs) with rules targeting CSRF attack patterns may provide temporary protection. Educating users to avoid clicking suspicious links while authenticated can reduce exploitation likelihood. Regular security audits and penetration testing focused on CSRF and other web vulnerabilities will help identify and remediate similar issues proactively. Finally, limiting user permissions and segregating duties within GeoDirectory can minimize the impact of any successful exploit.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-23T12:31:46.854Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69738ada4623b1157c48ba67

Added to database: 1/23/2026, 2:51:06 PM

Last enriched: 1/31/2026, 8:26:50 AM

Last updated: 2/7/2026, 5:16:26 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats