VYPR
Medium severity6.1NVD Advisory· Published Jan 21, 2025· Updated Apr 15, 2026

CVE-2024-13444

CVE-2024-13444

Description

The wp-greet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The wp-greet plugin ≤6.2 lacks CSRF protection, allowing unauthenticated attackers to update settings and inject web scripts via forged requests.

Vulnerability

Overview

The wp-greet WordPress plugin, up to and including version 6.2, is vulnerable to Cross-Site Request Forgery (CSRF). This arises from missing or incorrect nonce validation on a function that handles settings updates and potentially other actions [1]. CSRF attacks rely on tricking an authenticated administrator into performing an unintended action, such as clicking a malicious link.

Attack

Vector

An unauthenticated attacker can craft a forged HTTP request that modifies plugin settings. To achieve this, the attacker must lure a logged-in site administrator into triggering the request—for example, by clicking a link in a phishing email or while visiting a compromised site [1]. The lack of a nonce means the request appears legitimate to the server.

Impact

Successful exploitation allows the attacker to change the plugin's configuration and, critically, inject malicious web scripts (stored XSS) into the admin interface or pages. This can lead to further compromise of the WordPress site, such as privilege escalation, data theft, or defacement [1]. The CVSS v3 base score is 6.1 (Medium), reflecting significant but non-critical impact.

Mitigation

The vulnerability affects all versions up to and including 6.2. Users should update to a patched version as soon as it becomes available. If no update is provided, consider disabling the plugin or implementing a Web Application Firewall (WAF) rule to detect or block CSRF-like behaviour [1]. No workaround is documented in the plugin's description.

References
  1. wp-greet

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.