The WPCafe – Restaurant Menu, Online Ordering for WooCommerce, Pickup / Delivery and Table Reservation plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.23 via the wpc_check_for_submission function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application.
CVSS
No CVSS.
References
Configurations
History
06 Mar 2025, 14:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Themewinter
Themewinter wpcafe |
|
CPE | cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
References | () https://plugins.trac.wordpress.org/changeset/3084054/wp-cafe/trunk/core/action/wpc-ajax-action.php - Patch | |
References | () https://plugins.trac.wordpress.org/browser/wp-cafe/trunk/core/action/wpc-ajax-action.php#L76 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/5f83c19e-1b75-4fea-b4de-f7f844a449c0?source=cve - Third Party Advisory |
23 May 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-23 02:15
Updated : 2025-03-06 14:25
NVD link : CVE-2024-1855
Mitre link : CVE-2024-1855
JSON object : View
Products Affected
themewinter
- wpcafe
CWE
No CWE.