Sploit.io - Search

Product: A no-code page builder for beautiful performance-b, version: >= n/a, <= 2.1.20

CVE-2024-24701

Severity: MEDIUM

Description: Cross-Site Request Forgery (CSRF) vulnerability in Native Grid LLC A no-code page builder for beautiful performance-based content.This issue affects A no-code page builder for beautiful performance-based content: from n/a through 2.1.20.

CVSS Score: 4.3

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110070000
  • Date: 2025-01-06

ExploitDB

No data available.

HackerOne Data

  • Rank: 7440
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Native Grid LLC A no-code page builder for beautiful performance-based content - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The CVE-2024-24701 vulnerability is a Cross-Site Request Forgery (CSRF) issue affecting the Native Grid LLC no-code page builder plugin for WordPress, specifically versions up to and including 2.1.20. This vulnerability has a CVSS base score of 4.3 (MEDIUM), indicating a moderate risk level. The attack vector is network-based, requiring no privileges and low attack complexity, but user interaction is necessary for exploitation. The primary impact is on integrity, as an attacker could trick authenticated users into performing unintended actions, such as modifying content or settings. However, there is no impact on confidentiality or availability.

    The likelihood of exploitation is moderate due to the requirement of user interaction, but the ease of exploitation is relatively high given the low complexity of the attack. The business impact could include unauthorized changes to website content, potentially leading to reputational damage or operational disruptions if critical settings are altered. While the vulnerability does not directly compromise sensitive data or cause service outages, it could still undermine trust in the platform and its security.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by crafting a malicious webpage or email containing a forged request targeting the no-code page builder plugin. When an authenticated administrator or editor visits the malicious page or clicks a link, the forged request could be automatically sent to the WordPress site. For example, the attacker could create a request to change the website's layout, delete content, or modify plugin settings.

    The attack process would involve the following steps:
    - The attacker identifies a target WordPress site using the vulnerable plugin.
    - The attacker crafts a malicious request, such as a form submission or API call, and embeds it in a webpage or email.
    - The attacker lures an authenticated user (e.g., an administrator) to interact with the malicious content.
    - The user's browser sends the forged request to the WordPress site, executing the unintended action without the user's knowledge.

    The potential outcomes include unauthorized changes to the website's content or settings, which could disrupt operations, harm the site's reputation, or require significant effort to revert.

    3. Mitigation Recommendations
    To mitigate this vulnerability, immediate action is required. The first and most critical step is to update the no-code page builder plugin to a version beyond 2.1.20, as the vendor has likely released a patch addressing this issue. If a patch is not yet available, consider temporarily disabling the plugin until an update is provided.

    Additionally, implement CSRF protection mechanisms, such as anti-CSRF tokens, to validate the authenticity of requests. Ensure that all forms and actions within the plugin require these tokens to prevent unauthorized requests. Regularly review and update all plugins and themes to their latest versions to minimize exposure to known vulnerabilities.

    For further guidance, refer to the following resources:
    - Patchstack advisory: https://patchstack.com/database/vulnerability/setka-editor/wordpress-setka-editor-plugin-2-1-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
    - WordPress plugin repository: https://wordpress.org/plugins

    4. Executive Summary
    CVE-2024-24701 is a moderate-risk vulnerability affecting the Native Grid LLC no-code page builder plugin for WordPress. It allows attackers to trick authenticated users into performing unintended actions, potentially leading to unauthorized changes to website content or settings. While the vulnerability does not compromise sensitive data or cause service outages, it poses a risk to the integrity of the website and could harm its reputation.

    The vulnerability is relatively easy to exploit but requires user interaction, making the likelihood of exploitation moderate. Immediate action is recommended to mitigate the risk, including updating the plugin to a patched version and implementing CSRF protection mechanisms. Addressing this vulnerability is crucial to maintaining the security and trustworthiness of the website, ensuring that unauthorized changes do not disrupt operations or damage the organization's reputation.