VYPR
Medium severity6.1NVD Advisory· Published Feb 19, 2025· Updated Apr 8, 2026

CVE-2024-13339

CVE-2024-13339

Description

The DeBounce Email Validator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.8.0. This is due to missing or incorrect nonce validation on the 'debounce_email_validator' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The DeBounce Email Validator plugin for WordPress up to 5.8.0 is vulnerable to CSRF, allowing unauthenticated attackers to modify settings and inject scripts via forged requests.

The DeBounce Email Validator plugin for WordPress, available on the WordPress plugin repository [1], is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to and including 5.8.0. The vulnerability stems from missing or incorrect nonce validation on the 'debounce_email_validator' settings page, which allows an attacker to forge requests that perform state-changing actions without the administrator's consent.

To exploit this vulnerability, an unauthenticated attacker must trick a site administrator into clicking a malicious link or visiting a crafted page. The forged request can then update plugin settings or inject malicious web scripts, as the request is processed with the administrator's privileges. No authentication is required for the attacker, only social engineering of a privileged user.

Successful exploitation enables an attacker to modify plugin configuration, potentially disabling email validation or redirecting data, and to inject arbitrary web scripts (stored XSS) that execute in the context of the administrator's session. This could lead to further compromise of the WordPress site, including theft of session cookies or privilege escalation.

As of the publication date, no patched version has been announced. Users running version 5.8.0 or earlier should monitor the plugin's update channel for a fix and consider implementing additional CSRF protections, such as using a Web Application Firewall (WAF) or temporarily disabling the plugin until a security update is available.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.