VYPR
Medium severity6.1NVD Advisory· Published Dec 14, 2024· Updated Apr 15, 2026

CVE-2024-12555

CVE-2024-12555

Description

The SIP Calculator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SIP Calculator plugin for WordPress is vulnerable to CSRF due to missing nonce validation, allowing unauthenticated attackers to inject malicious scripts via forged requests.

Vulnerability

Overview The SIP Calculator plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to and including 1.0. The root cause is the absence of nonce validation on a function, which is a standard security check to ensure that requests are intentionally made by the user. This oversight enables unauthenticated attackers to perform actions on behalf of an authenticated administrator without their consent [1].

Attack

Vector To exploit this vulnerability, an attacker must trick a site administrator into performing an action, such as clicking on a crafted link [1]. The attack does not require any authentication from the attacker, but it relies on social engineering to deceive a legitimate user. The forged request could trigger a state-changing operation or inject malicious web scripts into the WordPress installation.

Impact

Successful exploitation allows an attacker to inject arbitrary web scripts, which could lead to a wide range of malicious activities, including defacement, data theft, or further compromise of the site and its users. The vulnerability is classified as Medium severity with a CVSS v3 score of 6.1 [1].

Mitigation

As of the publication date (2024-12-14), the vendor has not released a patched version. Site administrators are advised to disable the plugin until a fix is available and to remain cautious of unexpected admin actions. The plugin's page does not indicate that a security update has been provided [1].

References
  1. SIP Calculator

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.